1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murrr4er [49]
3 years ago
7

PLZ ANSWER IT..IT IS VERY URGENT....​

Computers and Technology
1 answer:
PSYCHO15rus [73]3 years ago
7 0

a) Cut/copy and paste allows you to select a section of text and insert a new copy of that text. You can also transfer data from one place to another.

b) Save is when you keep your work for later and it will be the same as you left it. Think of it like putting a bookmark in your book. Save as lets you name the files.

c) Close and Exit just let you leave the program, saying you are finished working with it and want to do something else.

You might be interested in
Kelly is working on creating a rocket-focused game in Scratch and is ready to add some sound. What should Kelly do if she wants
Alja [10]

Answer:i think she should add a new sound from the soundtab and use the start sound block to attach her sound to the rocket.

Explanation:

8 0
3 years ago
Read 2 more answers
An organization is looking to add a layer of security by implementing a solution that protects hosts against known and unknown m
klio [65]

Answer: D) Whitelisting

Explanation:

Whitelisting are used in many applications and it only allows the good known apps. Whitelisting are majorly used for security purpose as, it permits to maintain or control the misuse the apps by employees in an organisation.

Blacklisting maintain the list of denied access system and it prevented the accessing undesirable program. It is also used as security application but it is less effective than whitelisting.

Encryption are the process which are not used in the restricting application. And lockout are used by the users for entering the password for many time as possible.  

Therefore, option (A) is correct.

4 0
3 years ago
We need ____ pointers to build a linked list.
adelina 88 [10]

Answer:

two

Explanation:

A linked list is a data structure which stores the multiple-element with data type

and a pointer that stores the address of the next element.

A linked list is a series of nodes connecting each other by a pointer.

a node contains data and a pointer.

For build an array, two pointers are used:

the first pointer for specifies the starting node called head node.

and the second pointer is used to connect the other node to build the linked list.

Both are used to build the array if we lose the head node we cannot apply the operation because we do not know the starting node and we cannot traverse the whole linked list.

for example:

1->2->3->4->5

here, 1 is the head node and -> denote the link which makes by the second pointer.

3 0
3 years ago
When the output (information) of an information system is used as new input it is called:____.
vfiekz [6]

When the output (information) of an information system is used as new input it is called feedback.

<h3>What is information from a system that is used to make changes to the input?</h3>

The term feedback 'is seen as a form of output that is said to be used to make alterations to input or processing activities.

Note that a system is made up of the interrelated components that carry out a lot of tasks that is said to be perceived as feedback of the  information system.

Therefore, When the output (information) of an information system is used as new input it is called feedback.

Learn more about feedback from

brainly.com/question/25653772
#SPJ1

5 0
2 years ago
How many warnings do u get before you like lose your account?
Step2247 [10]

Answer: 5 warnings untill your account is gone.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Select the best option that should be considered when preparing these images to.be used for the web
    7·1 answer
  • Which sentences in the passage correctly describe a function?
    11·1 answer
  • PLEASE VERY IMPORTANT Conduct research on graphic design skills in your area and explore the different courses that they offer l
    12·1 answer
  • The presentation layer describes the layer where computers interact with _____
    8·2 answers
  • Why is Apple using social media ?
    15·1 answer
  • Jody should select the
    5·1 answer
  • BitTorrent, a P2P protocol for file distribution, depends on a centralized resource allocation mechanism through which peers are
    8·1 answer
  • Create a script that will determine how many of each currency type are needed to make change for a given amount of dollar and ce
    8·1 answer
  • What is connected to the base unit in Desktop PC?
    14·1 answer
  • True/False: Each individual element of an array can be accessed by the array name and an element number, called a subscript. Tru
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!