1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babunello [35]
3 years ago
12

"Save" or "save as" can be used interchangeably and have no unique features. True False

Computers and Technology
2 answers:
allsm [11]3 years ago
8 0
False

Save as is used to select a destination for your file and it’s file type
zimovet [89]3 years ago
4 0

Answer:

False.

Explanation:

"save" just preserves any edits made to file in its current state. "Save As" lets you rename it and change the file type.

You might be interested in
If you interview a dentist to learn about her experiences on the job, she is considered a secondary source of information. Pleas
Alik [6]

A source can be either primary or secondary. The statement that if you interview a dentist to learn about her experiences on the job, she is considered a secondary source of information is false. A primary source provides direct or firsthand  experience, while a secondary source of information describes or analyzes the primary source. In this case, when the dentist is interviewed she is considered as primary source because she is speaking about herself and her experience.


6 0
3 years ago
Read 2 more answers
Both instructions and data in a digital<br>computer are represented as binary<br>digits. True False​
MrRissso [65]

Answer:

False

Explanation:

insturctions are represented in binary numbers, data are represented in decimal numbers.

6 0
3 years ago
Which element of the security policy framework requires approval from upper management and applies to the entire organization?A.
Sav [38]

Answer: A) Policy

Explanation:

Security policy framework is the regulations that are links the information security of an organization with the professionals and business .It maintains the responsibilities and documentation with security .

  • Policy is the document containing expectation,importance, requirement and scope of an organization about security .This security plan is high level document that need to be approved by higher management for implementation in company.
  • Other options are incorrect because standard principles, guidelines in form of regulation and procedure is the manner that is not required for to be permitted by higher management for being implemented on the business organization.
  • Thus the correct option is option(A).
8 0
3 years ago
3.A ball is thrown into the air with an initial velocity of 15 m/s. a.How long does it take the ball to reach maximum height?b.W
ehidna [41]

Answer:  a) = 1.5 sec.  b= 11.5 m. c=0  d= 1.5 sec.

Explanation:

a) Once thrown into the air , the only influence on the ball is gravity, so, we can conclude that the acceleration acting on the ball is the one due to gravity, i.e., g= 9.8 m/sec².

Applying the definition of acceleration, we can write the following equation:

a= (vf-vo) / t   ⇒ g = vf-vo / t. (1)

Now, when the ball reaches to his maximum height, it stops momentarily, and then starts to fall, so for this height, we can write vf=0.

Replacing  in (1), and solving for t, we get:

t = (0 -vo) / g = -15 m/s/ - 9.8 m/sec² (Taking upward as positive  direction)

a) t= 1.5 sec.

Replacing this value in the kinematic equation for displacement, when vo=15 m/s, we get:

hmax: 15 m/sec . 1.5 sec -1/2. 9.8 m/sec². (1.5 sec) ² (2)

b) hmax= 11.5 m

c) vf= 0 (as explained above)

Finally, in order to know how long the ball takes to return to its initial height, we know that for the falling part of the trajectory, vo=0, so we can write the equation for displacement as follows:

h=-hmax (because it returns to the same starting point)= 1/2 gt²=-11.5 m

Solving for t, we get:

d) t=1.5 sec.

It can be seen that the time used in going up, it is the same for going down, to travel the same distance.

This result is completely general and applies to any free fall problem.

3 0
3 years ago
A technician is using a network-attached desktop computer with a Type 2 hypervisor to run two VMs. One of the VMs is infected wi
lianna [129]

Answer:

Place both VMs on virtual NICs that are isolated from the company LAN.

Explanation:

From the scenario above, for the technician to best protect the company's LAN while performing the above mentioned tests, it us best to place both VMs on virtual NICs that are isolated from the company LAN.

Cheers

4 0
4 years ago
Other questions:
  • What is the name of a robot astronaut created by NASA
    14·2 answers
  • What is the full meaning of ICT
    14·2 answers
  • What are the 4-bit patterns used to represent each of the characters in the string "1301"? Only represent the characters between
    14·1 answer
  • Write the function mystrchr(). the function has two parameters: a const char * s pointing to the first character in a c-style st
    14·1 answer
  • On a Windows network share, if the user can add, edit, and delete files and folders within the LabFiles folder, what type of acc
    14·1 answer
  • Which function will add a name to a list of baseball players in Python?
    13·2 answers
  • Study the sentences below. A.Changing the properties of characters in a sentence or paragraph in a Word document helps increase
    5·2 answers
  • The acronym pies is used to describe improvised explosive devices (ied) components. pies stands for:
    13·2 answers
  • You Could Never Size Me UP! Been Doing This Sh*t A Long ⏱time
    15·1 answer
  • Write a qbasic program to design any simple software with output ​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!