1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ki77a [65]
3 years ago
11

True or false questions:

Computers and Technology
1 answer:
mash [69]3 years ago
5 0
My answers are just from my personal knowledge.
1. False
2. False
3. True 
4. True
5. False 
6. True
7. True 
8. True
9. True 
10. True
11. True 
12. False
13. False
14. False
15. True

I believe these are the answers!


You might be interested in
Why would a programmer want to overload operators rather than use regular member functions to perform similar operations?
Harlamova29_29 [7]
The Programmer wants to overload operators rather than use a regular member of the functions to perform similar operations because of two main reasons:
1. For easy and simpler definition of the functions. There would be one pointer who will call the function every time is needed in the program.
2. For easier comparisons of parameters.
4 0
4 years ago
While conducting routine maintenance, you discover a network server that needs to
patriot [66]

Answer:

tell the truth and make other people aware of what is going on inorder for them to also be hands on deck and come up with solutions to also help solve the problem

3 0
2 years ago
Which of these statements correctly describes how to adjust an image on a slide ?
loris [4]

The correct answer is Choice D.

In order to adjust an image on a slide you can resize it by clicking on the boxes at the corner and then moving it in or out in order to change its size.

3 0
3 years ago
Read 2 more answers
Explain the differences in technology between a CRT, LCD, and LED television.
uysha [10]

Answer:

The age of CRT (cathode ray tube) displays is over and LCD displays are already being replaced with LED screens. ... While LCD monitors use CCFL (cold cathode fluorescent lamps) for backlighting, the latter use light emitting diodes. This is the prime difference between the two display technologies.

Explanation:

3 0
3 years ago
What is the technique used to divide information sets into mutually exclusive groups such that the members of each group are as
mars1129 [50]

Answer:

C. Cluster analysis

Explanation:

<em>Cluster analysis </em>or clustering is the task of grouping a set of objects in such a way that objects in the same group are more similar to each other than to those in other groups.

This statistical method is used to group similar objects into respective categories by <em>identifying trends and patterns</em>.

Cluster analysis is typically used in the <em>exploratory phase of research </em>when the researcher does not have any per-conceived hypotheses. It is commonly not the only statistical method used, but rather is done in the early stages of a project to help guide the rest of the analysis.

5 0
4 years ago
Other questions:
  • Write the definition of a function divide that takes four arguments and returns no value . The first two arguments are of type i
    8·1 answer
  • Jonas is an experienced security professional who recently accepted a position in an organization that uses Check Point firewall
    9·1 answer
  • Which of the following is not a compilation error? Group of answer choices a. Placing a semicolon at the end of the first line o
    13·1 answer
  • An Administrator wants to have a thank you email sent after the form on the "Request a Demo" landing page is submitted. Where ca
    12·1 answer
  • Because floating points have decimals, they're more precise and take up more memory than integers.
    6·1 answer
  • import java.util.Scanner; public class ArraySum { public static void main(String[] args) { Scanner scnr = new Scanner(System.in)
    9·1 answer
  • Complete the function by filling in the missing parts. The color_translator function receives the name of a color, then prints i
    11·1 answer
  • Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended
    13·1 answer
  • Write a number guessing game. The game should have a default 1-100 picking system. Have the user guess the number the computer p
    12·1 answer
  • Can anyone tell me about Microsoft some important features for partical
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!