1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Likurg_2 [28]
3 years ago
13

Which property is assigned to a file by the operating system?

Computers and Technology
1 answer:
Zolol [24]3 years ago
7 0
Your answer would be a type
You might be interested in
_______________creates new markets separate to the mainstream; markets that are unknowable at the time of the technology's conce
elena-s [515]

Answer: a)Disruptive innovation

Explanation: Disruptive innovation is the innovation technique indulges in market through new market strategy and value network. This techniques damages the existing market market and its values .The displacement of the current product extincts from the market through this technique.

Other options are incorrect because paradigm shift is influence losing in the market and sustaining innovation is used for the improving the product's marketing and value .Thus, the correct option is option(a).

3 0
3 years ago
Technology can help governments handle economic emergencies, such as the reliance on automation. Crop and resource shortages. Th
uranmaximum [27]

Answer

Technology can help government handle economic emergencies such as crop and resource shortages.

Explanation

The government can address the concerns of food shortages and water scarcity through embracing new technology interventions to increase farm yields and mitigate the impacts of water shortages. Through crop protection methods, weeds and pest can be controlled. Drip irrigation technology applies water directly to the roots of crops to facilitate high crop production. Other technologies to apply can include organic agriculture and integrated soil fertility management.



3 0
3 years ago
Read 2 more answers
Which tab on the Table Tools contextual tab is used to control the style and formatting of the table as it relates to colors for
laila [671]

Answer: The answer would be the "Home Tab"

Explanation:

4 0
3 years ago
Consider the LIBRARY relational database schema description provided below which is used to keep track of books, borrowers, and
sdas [7]

Answer:

1) Yes, Publisher relation should have a publisherID primary key.

2) NOT NULL and UNIQUE for the BookID, BranchID, CardNumber and name of the borrower in the Book, Book_Copies, Library_branch, and Borrower relations respectively. The DueDate field of the book_loan relation must be a time constraint. The BookID of the Book relation must be serial number for automatic addition and update of bookid across the database.

Explanation:

The Publisher relation should have primary key publisherID which should replace the publisherName in the Book relation to easily make a join query and attain a third-level database model.

8 0
3 years ago
In general, WAN-specific standards identify specific security requirements for WAN devices. For example, the ___________________
allsm [11]

Answer:

WAN router security standard, Web services standard

Explanation:

Complete statement with blanks filled:

In general, WAN-specific standards identify specific security requirements for WAN devices. For example, the WAN router security standard explains the family of controls needed to secure the connection from the internal network to the WAN router, whereas the Web services standard identifies which controls are vital for use of Web services provided by suppliers and external partnerships.

7 0
3 years ago
Other questions:
  • Describe encryption at gateways in thePresentation layer of the OSI Reference Model
    6·1 answer
  • The syntax for accessing a class (struct) member using the operator -> is ____.
    15·2 answers
  • The presentation layer describes the layer where computers interact with _____
    8·2 answers
  • Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending whe
    5·2 answers
  • A software engineer is designing a new program. She decides to first define all the classes needed, and how they will interact w
    5·2 answers
  • In this chapter, you saw an example of how to write an algorithm that determines whether a number is even or odd. Write a progra
    6·2 answers
  • ​________________________ are the main forms of direct and digital marketing. A. Mobile​ marketing, social media​ marketing, and
    5·1 answer
  • A new attack involves hacking into medical records and then offering these records for sale on the black market. A medical recor
    14·1 answer
  • Read the citation example, and then use the drop-down menus to identify each part.
    8·2 answers
  • Select the three concepts of capital outlay.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!