1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dybincka [34]
3 years ago
8

1st row has 3 possible answers software program, web page, and web browser

Computers and Technology
1 answer:
Maurinko [17]3 years ago
7 0

Answer:

1st row: software program

2nd row: a user's computer

hope i've helped.

You might be interested in
2. How do upgrading and retraining help you cope with change?
Luden [163]
<h2>Upgrading and retraining are mandatory to move along with the world.</h2>

Explanation:

Let us understand the term deeply,

Upgrading - Updating yourself with the latest

Retraining - learning new skills

Let me give you a real-life example which is nothing but "mobiles". If you are not updated then:

  • you will sit with mobile to make calls and
  • do money transactions only by stepping into the bank,
  • connect with people only through calls or directly visiting them,
  • distance break up the relationship,
  • booking tickets in classical way, etc.

These could be done in one touch if you have latest mobile with necessary applications.

In a similar way, we need to get retrained to get to learn new skills, technologies so that we can do our job the best, to be on track, be productive, convert your valuable knowledge in terms of money, to be peaceful in day today transactions, etc.

7 0
2 years ago
Where could an identity theft access your personal information?
noname [10]
Hey there!

Here is your answer:

<u><em>The proper answer to your question is "through websites".</em></u>

Reason:

<u><em>There are many ways identity thefts make there attacks but the most common ways is using unsafe websites. These websites most likely sell cheap products that require you to give all of your personal information in order to buy the product. </em></u>

Therefore the answer is using unsafe websites.

If you need anymore help feel free to ask me!

Hope this helps!

~Nonportrit
8 0
2 years ago
Read 2 more answers
Given a Fully Associative cache with 4 lines using LRU replacement. The word size is one byte, there is one word per block, and
uranmaximum [27]

Answer:

3 bits

Explanation:

Capacity of main memory=16 Bytes=24

The number of address bits= 4 bits.

The size of the word= 1 Byte=20

The word bits=0.

Number of lines =4

Number of sets required=21

The sets bits is =1

The number of offset bits=20=0

Number of tag bits= total number of address bits - (word bits + offset bits + set bits)

= 4 - 0 -0- 1

= 3 bits

8 0
3 years ago
The Sales team uses the /sales directory to store documents related to sales, contacts, and orders. Currently, permissions on th
kvasek [131]

Answer:

it should be d

Explanation:

please mark this as brainlists i could really use it

6 0
2 years ago
What differences in traffic patterns account for the fact that STDM is a cost-effective form of multiplexing for a voice telepho
fgiga [73]

Answer:

Answer explained below

Explanation:

statistical time division multiplexing (STDM) and frequency-division multiplexing (FDM)

They both STDM and FDM works well for the channels which transmit continuously like telephone, FM radio and TV which continuously transmit signal. Since inactive lines are wasted this makes these venues a good fit for STDM and FDM. which means if the signals are dropped or not received to the receiver than it won't have to send the signals again which is why STDM and FDM are useful in these cases.

In Traditional Computer Communications system, the system have tended to be a lot more 'bursty' with idle periods. Hence if we use the FDM and STDM than the usage patterns of STDM and FDM would waste this idle time. so that is why we tend not to use the FDM and STDM in the general purpose computer network.

7 0
3 years ago
Other questions:
  • Cryptolocker is an example of what type of malware?
    11·1 answer
  • In 2-3 paragraphs, identify at least two ways technology and innovation have affected global economic competition. Provide a spe
    5·1 answer
  • If a hypothesis is strongly supported by the scientific community based on compelling experiment results, it becomes a————
    10·2 answers
  • Which describes the third step in visual character development
    9·2 answers
  • is an interviewing method in which a mall interviewer intercepts and directs willing respondents to nearby computers where each
    7·1 answer
  • Electronic components in coputers process data using instructions, which are the steps that tell the computer how to perform a p
    5·1 answer
  • Which of the following is NOT considered an interactive?
    8·1 answer
  • Please help on both of these questions will give brainliest<br> !!
    9·2 answers
  • Does nest cam outdoor connect to a security camera prewire
    15·1 answer
  • To conserve its public IP addresses, a company can instead use ____ addresses for devices within its own network boundaries.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!