1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVETLANKA909090 [29]
3 years ago
7

Placeholders can hold text but not graphics such as photos or charts. True or false?

Computers and Technology
1 answer:
sasho [114]3 years ago
6 0
False. a placeholder can hold everything 
You might be interested in
your manager asks you to set up a secure network connection at a remote site to move over some backups which protocol would you
nlexa [21]

The protocol that should be used for establishing a secure network connection is SSH.  

The following information is to be considered:  

  • SFTP is secure also it is a protocol for file transferring that applied SSH.
  • IP, FTP, and DHCP should not be for safety purposes as they are not secure.
  • SSH is a secured connection for the remote sites so here the SSH protocol should be used.

Therefore we can conclude that The protocol that should be used for establishing a secure network connection is SSH.

4 0
2 years ago
An excel file called “student_gpa” is opened. What does the funnel next to “GPA” indicate
Ivan

Answer is A. The data has been filtered

The funnel in Excel lets you know that there is a filter in place on the columns. It is a filter icon. By default, any filtered column in Excel gets a little funnel icon on the top row as shown in the image attached. Once this funnel symbols is clicked, it gives you options to filter using several criteria.

6 0
3 years ago
Difference between system and software development life cycle
umka2103 [35]

Answer:

Software development life cycle is about building a software (“only”) in a phased approach systematically.

System development life cycle is about implementing hardware and software in a phased manner systematically.

Explanation:

Here both the hardware and the software is considered as a system.

Hope this helps!

3 0
3 years ago
What is the biggest difference between technical communication and the other kinds of writing you have done?
lukranit [14]

Answer:

 The main difference between the technical communication and the other different kinds of communication is that as follow:

  • In technical communication, the data or information must be specific and to the point. On the other hand, in general communication there is no such boundary for the conversation.
  • The content of the technical conversation should be in proper and systematic format and in general communication there is no such formatting required.
  • The technical communication always focus on the audience and main purpose of the conversation as compared to general communication.

3 0
2 years ago
Give brief comparison of Broadcast, Unicastand Multicast?
Alex Ar [27]

Answer:

In broadcast the message is transmitted from one to all , in uni cast we have one to one transmission and in multicast we have transmission from one to many.

Explanation:

If we take the example of a simple messaging application it will be clear. If a message is exchanged between one person to another, then it is uni casting. If a person sends a message to all the persons in his contact list then it is broadcasting and  if a person sends messages to select persons in his contact list then it is multi casting. In multi casting management of the group is required regarding who can receive messages which is not required in broadcasting.

4 0
3 years ago
Other questions:
  • A queueing system has four crews with three members each. The number of "servers" is:
    5·2 answers
  • Assume n represents the number of inputs. The possible number of states within a truth table can be calculated using which of th
    10·1 answer
  • ________ are chunks of software - installed on one's computer, tablet, or smartphone - that are gateways to games, online resour
    8·1 answer
  • What is the value of the variable result after these lines of code are executed?
    11·1 answer
  • PLEASE HELP I mainly only need the answer for 4.
    5·1 answer
  • Meaning and explanation of fortran​
    11·2 answers
  • What are some applications of computer in public administration?​
    8·1 answer
  • Please help fast
    5·1 answer
  • When you create a new database using --------- , the database includes prebuilt tables and forms which you can populate with dat
    15·1 answer
  • The chain of _____ documents that the evidence was under strict control at all times and no unauthorized person was given the op
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!