1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
3 years ago
9

What do Dynamic-Link Library (DLL) files do?

Computers and Technology
2 answers:
Ilia_Sergeevich [38]3 years ago
7 0

The correct answer is B provide operating systems with information about performing specific computing functions

I just took the test on Edgen

SIZIF [17.4K]3 years ago
6 0

Answer:

its B. provide operating systems with information about performing specific computing functions

Explanation:

just trust bruv

You might be interested in
What is keyboard? answer me <br>​
Grace [21]

Answer:

something you put your fingers on

Explanation:

3 0
3 years ago
Read 2 more answers
What would be a situation in which you could use an excel chart to present your data
Pavlova-9 [17]
Having to compare results on experiments or lab tests to each other.
5 0
4 years ago
Read 2 more answers
A unique ability of people which sets them far apart from animals is:
LuckyWell [14K]
It is observation :)
6 0
4 years ago
Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
antiseptic1488 [7]

Answer:

Tell about an experience with a computer virus.

Explanation:

Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.

In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, <u>it would have been better if the writer includes experience with a computer virus</u> so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.

Thus, the correct answer is the first option.

3 0
3 years ago
In a three-tier architecture, the component that runs the program code and enforces the business processes is the:_______.
madam [21]

Answer:

Application Server

Explanation:

The Application Server is a component in computer engineering that presents the application logic layer in a three-tier architecture.

This functionality allows client components to connect with data resources and legacy applications.

In this process of interaction, the Application Server runs the program code from Tier 1 - Presentation, through Tier 2 - Business Logic to Tier 3 - Resources, by forcing through the business processes.

8 0
3 years ago
Other questions:
  • What was the han dynasty and the roman empire known for?
    5·1 answer
  • What does BMP stand for?
    10·2 answers
  • Technician A says that a ratio is a comparison between two values. Technician B says that in a compression ratio, the main value
    5·1 answer
  • What is f(-3) for the function f(a)=-2a2-5a+4?​
    10·1 answer
  • The smallest building block of a wireless lan is a ______.
    5·1 answer
  • Can i edit my name on this app?
    7·1 answer
  • Sharon must give an informative presentation to a group of teenagers about cultivating earthworms for use in home gardening. Whi
    11·2 answers
  • Some one help pls will mark brainless !!!!!
    13·1 answer
  • An analogue sensor has a bandwidth which extends from very low frequencies up to a maximum of 14.5 kHz. Using the Sampling Theor
    9·2 answers
  • Is anyone a robIox moderator?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!