1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lemur [1.5K]
3 years ago
11

What can be designed to create annoying glitches or destroy data

Computers and Technology
1 answer:
Yanka [14]3 years ago
3 0
Viruses can cause this.
You might be interested in
Frequently used commands can be placed in or on the _____ in the top left corner of the window.
podryga [215]

Answer:

b. Quick Access Toolbar                                        

Explanation:

  • Quick Access Toolbar is a customizable toolbar that is displayed in Microsoft Excel, Microsoft Word, and other Office products.
  • It appears in the top left corner of the window by default.  
  • QAT provides with quick access to frequently used features e.g. the Save, Undo, Redo features.
  • When you click on the drop down menu of QAT, it allows you to customize QAT. This enables you to add and remove the commands that are displayed in the toolbar. These are default commands however, it allows you to add your own commands. You can add commands to the QAT that you frequently use. You can import or export these modifications.
  • For example Excel Quick Access Toolbar contains only 3 buttons by default Save, Undo and Redo.

7 0
3 years ago
PLZ HELP !!!!! <br> plzzzz
kozerog [31]

Answer:

Producers

Explanation:

Producers manufacture and provide goods and services to consumers.

7 0
3 years ago
What is the relationship between CAD and CIM ?
Marat540 [252]
<span> CAM( computerised Aided Manufacture) is when you have workers being helped by computerised tools, CIM (computerised intergated manufacture) is when the whole process is computerised, in manufacture this usually uses robotic arms. These can manufacture 24/7 in needed, they can work very accurately ( they are faster and stronger than a human arm) </span>
5 0
3 years ago
Read 2 more answers
When considering the typical characteristics of a server, how is the server optimized in relation to applications?
VLD [36.1K]

Answer: Server are optimized so that they can work efficiently and improve their performance while working. Application server optimization mechanism can be used for optimizing the server with respect to the application.

Some of the techniques used in the application server optimization are as follows:-

  • Load balancing- which helps in upgrading throughput ,improves the time of response, enhance the bandwidth of network etc.
  • Fail-over management- it is used for decrement of latency, balancing the server, increasing the availability of network and it resources etc.

3 0
3 years ago
Determine if the following identifiers are valid. If they are invalid, state the reason. For example, the identifier min value i
Natasha2012 [34]

Answer:

Explanation:

Determine if the following identifiers are valid. If they are invalid, state the reason. For example, the identifier min value is invalid as it uses a whitespace.

road

mid_point

8ball

break

_log_value

EVERY1

[email protected]

_log

NewNumber

$varA

class

4 0
3 years ago
Other questions:
  • Which activity represents a violation of the licensing agreement
    7·2 answers
  • If you define CSS rules on a parent control, the rules will be inherited by all of the children widgets.
    12·1 answer
  • Which is an example of a screenshot?
    7·2 answers
  • Which practice represents the trait of effective communication?
    6·2 answers
  • How might an engineer test a computer chair for comfort?
    10·1 answer
  • Consider the following definition of the recursive function mystery. int mystery(int first, int last) { if (first &gt; last) ret
    12·1 answer
  • Identify tags and attributes in HTML 5
    5·1 answer
  • What: A challenging question on this module's material.
    14·1 answer
  • The term Linux Intrusion Detection System ( LIDS) refers to a command that allows an administrator to run processes as root with
    5·1 answer
  • Write steps for converting decimal to binary numbers?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!