1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hammer [34]
3 years ago
12

Is a bottle opener considered an engineered item?

Computers and Technology
1 answer:
KIM [24]3 years ago
3 0
Yes actually it is it’s a machine to use for opening bottles such as cans n other
You might be interested in
you have been using snmp on your network for monitoring and management. you are concerned about the security of this configurati
Zinaida [17]

The thing that should be done is to implement version 3 of SNMP.

<h3>How to depict the information?</h3>

In this situation, the person has been using snmp on your network for monitoring and management. you are concerned about the security of this configuration.

Therefore, since the person is concerned about the security of this configuration, the thing that should be done is to implement version 3 of SNMP.

Learn more about configuration on:

brainly.com/question/26084288

#SPJ12

6 0
1 year ago
Is backing up computer files done on the hard drive?
8_murik_8 [283]
Yes but if the hard drive stops working you will lose your files so it's better to backup your files to a cloud like iCloud by Apple.
5 0
3 years ago
Read 2 more answers
In which of the following situations would it be most appropriate to choose lossy compression over lossless compression?
malfutka [58]

Storing music files on a smartphone in order to maximize the number of

songs that can be stored is most appropriate for choosing lossy

compression over lossless compression.

<h3>What is Lossy compression?</h3>

Lossy compression refers to a type of data compression which results in

the file size being small. Most times the quality is reduced as a result of

this .

This gives rise to more space being made available for the storage of more

song files which is why it is most appropriate.

Read more about Lossy compression here brainly.com/question/18806025

7 0
2 years ago
We have a user Sally Smith who we want to grant the ability to launch applications and browse folders. But we do not want her to
igomit [66]

Answer:

LIST

Explanation:

NTFS is A proprietary journaling file system developed by Microsoft. It started with windows 3.1.

List Folder Contents: Is what Gives authorized user the permission to viewing and listing of files and sub-folders as well as executing of files inherited by folders only.

NTFS permissions applies to every file and folder stored on a volume formatted with the NTFS file system. By default, permissions are inherited from a root folder to the files and sub-folders beneath it, although this inheritance can be disabled.

List Folder Contents will allow you to display the folder's contents and to display the data, attributes, owner, and permissions for files within the folder.

The NTFS permission that applies to the Domain Users group that will allow Sally to do what he wants without allowing more access than necessary is LIST.

8 0
3 years ago
Vices for a research paper
muminat
Advice?
find a topic that can work well with you’re writing about so you get the detailed analysis
4 0
3 years ago
Other questions:
  • Which of the following parameters should match in order for a pair of routers to form an adjacency when running OSPFv2? (Points
    9·1 answer
  • The mods have peanuts for brains (it's true, I lost like 1k points to them for no reason)
    12·1 answer
  • What is transaction model?
    9·2 answers
  • How can you tell that a spreadsheet was saved as a 2007 Excel file?
    7·1 answer
  • When an instrument in the dashboard of your car informs you the air pressure in the right rear tire is low, what type of compute
    14·1 answer
  • Universal Containers is building an integration between Salesforce and their Accounting system. The integration will utilize out
    8·1 answer
  • What type of software testing is generally used in Software Maintenance?
    11·1 answer
  • Choose all stages of the information processing cycle.
    12·2 answers
  • True or False? Security code is almost always open source!<br> True<br> False
    8·2 answers
  • What was revolutionary about Web 2.0?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!