1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
4 years ago
8

Please select the word from the list that best fits the definition

Computers and Technology
2 answers:
ivann1987 [24]4 years ago
7 0

Answer:

MUSICAL

Explanation:

Musical people love songs and love to sing

Troyanec [42]4 years ago
6 0

Answer

Linguistics

Explanation:

linguistics can be defined as scientific study of language and its structure, including the study of grammar, syntax, and phonetics.

there are some  Specific branches of linguistics  and that include computational linguistics, comparative linguistics, and structural linguistics.

study material into songs can also be defined as a linguistic hence linguistic is the correct option for you question

You might be interested in
Manipulate the SQL statement to pull ALL fields and rows from Customers table that have a PostalCode of 44000. TIP: Since Postal
padilas [110]

Answer:

There are two customers in the PostalCode.

SQL statement for select all the fields and the rows from the Customers table where PostalCode is 44000.

SELECT *  FROM Customers  WHERE PostalCode = "44000";

Explanation:

The SELECT statement retrieve zero or more than one row from 1 or more than one the database tables or the database views.  

In most of the applications, the SELECT query is most commonly used for DQL(Data Query Language) command.  

SQL is the declarative programming language and the SELECT statement specifies the result set, but they do not specifies how to calculate it.

6 0
3 years ago
A security engineer is configuring a wireless network that must support mutual authentication of the wireless client and the aut
rewona [7]

Answer:C) PEAP(Protected Extensible Authentication Protocol)

Explanation: PEAP(Protected Extensible Authentication Protocol) is the protocol that is used in point-to-point network connection and wireless network connection.It is the version of EAP(Extensible Authentication Protocol) with the advantage of protection to maintain the security.

Other options are incorrect because EAP-FAST is the EAP protocol with that has flexible authentication through secure tunneling, EAP-TLS is the EAP protocol with the transfer layer security and EAP is used for the expansion of authentication method for the network between internet and computer system.Thus, the correct option is option(c).

7 0
3 years ago
Which of the following allows data to coordinate activity between devices? Select one: a. Address bus b. Collisions c. Data bus
AnnyKZ [126]

Answer:

The correct option is D: Control Bus

Explanation:

A control bus is usually used by the Central Processing Unit to communicate with all the devices that are connected or contained within a computer. This connections are usually done via physical connections such as printed circuits or cables. It is also called a Computer bus and helps in coordinating activities between the connected devices.

5 0
3 years ago
When listing columns in the select list, what should you use to separate the columns?
Gala2k [10]
The answer is commas.  <span>When listing columns in the select list, commas should be used to separate the columns.</span>
6 0
4 years ago
When a security administrator wants to conduct regular test on the strength of user passwords, what may be the best setup for th
wariber [46]
I think it’s letter c
4 0
3 years ago
Other questions:
  • Tom only thinks about his own gain and does not care about the team objectives. What quality is he demonstrating? A. resourceful
    9·1 answer
  • What is my credit card billing zip code??
    15·1 answer
  • What is the correct process for selecting an entire row in a spreadsheet?
    8·2 answers
  • What are the features of Cobol language that make it suitable for programming business applications.
    6·1 answer
  • To change the name of a field, press and hold or right-click the column heading for the field, tap or click ____ on the shortcut
    7·1 answer
  • What are digital forensic techniques? A. Identifying, extracting, and evaluating evidence obtained from digital media such as co
    11·1 answer
  • Which of the following cannot be used in MS Office.<br> Joystick<br> Scanner<br> Light Pen<br> Mouse
    6·1 answer
  • What are some catchy names for computer basics that you would put on a childrens poster?
    9·1 answer
  • What could happen if I break copyright law in the future​
    14·2 answers
  • Calculate how many different pixel colours could be formed if one of the bytes gives the intensity of the red colour, one of the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!