1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solmaris [256]
3 years ago
14

SOMEONE PLEASE HELP ASAP!!

Computers and Technology
2 answers:
motikmotik3 years ago
8 0

1.) Canvas and Cardboard

2.) Applied art

3.) A representation of a person

4.) A 3-D type of work

6.) Crop

7.) Clip art

8.) Digital Camera

9.) Technique

10.) Allegory

11.) Expense of the specialized programs used to complete the process

12.) Technology transfer

13.) It can be copied, distributed, and displayed as long as no other version of the work is created

14.) It has been made available for any use in any piece of work that is also put in the public domain

15.) Some Rights Reserved: Noncommercial

m_a_m_a [10]3 years ago
6 0
For number 3 I believe the answer is A\
You might be interested in
The code size of 2-address instruction is________________.? 5 bytes? 7 bytes? 3 bytes? 2 bytes
Finger [1]

Answer:

7 bytes

Explanation:

<u>2 Address Instruction</u>

The 2 address instruction consist 3 components in the format.

One is opcode,other two are addresses of destination and source.

<u>Example-</u>

load b,c | Opcode   destination address,source address

add a,d  | Opcode   destination address,source address

sub c,f    | Opcode   destination address,source address

Opcode consists of 1 bytes whereas destination address and source address consist of 3 bytes each.

(1+3+3) bytes=7 bytes

5 0
3 years ago
Which best describes IMEI?
Delicious77 [7]

Answer:

A unique identifier for a mobile phone

Explanation:

There are different codes and tracking number assigned to different devices such as laptop, mobiles and other devices. The purpose of this task is to make sure the security of device in all aspects. The tracking number that is used to track mobile phone is named as IMEI that stands for International Mobile Equipment Identity.

IMEI is the the unique identity of mobile phone device that consists of 15 digits. It is the unique number that is assigned to phones.

8 0
2 years ago
Implementing multiple types of technology and thereby precluding that the failure of one system will compromise the security of
Setler79 [48]

Answer:

Redundancy

Explanation:

  • There are several redundant computer systems that can be applied to various operating systems and platforms.
  •  In any case, a server usually has redundant components, disks, network cards and power supplies.
  • The servers usually have two network cards with data redundancy, so in case of failure we will always have one of them available.
  • In conclusion, data redundancy is a fundamental system for the correct storage of the data available in the database.
5 0
2 years ago
A client wishes to update their legacy system even though there have been no
gulaghasi [49]

Answer:

A client wishes to update their legacy system even though there have been no security breaches since its implementation five years ago. If the client has not suffered any attacks, why is it still necessary to update their system? ... Because new security threats emerge all the time.

8 0
3 years ago
Complete the sentence.
neonofarm [45]
Answer 2.) encouraged
4 0
2 years ago
Other questions:
  • The ________ is(are) used to display information on the computer's screen.
    13·1 answer
  • Which network could NOT carry commercial traffic?
    5·1 answer
  • Using symbols (%, $, #, etc.) can make it easier to take notes.
    8·2 answers
  • What are search tries? Why are they more efficient than usualsearching<br><br> algorithms?
    8·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    5·1 answer
  • If someone wanted to talk to a financial institution representative in person they would need to _____.
    5·1 answer
  • PLEASE HELP!! Computer science test
    11·1 answer
  • How to create create a database in mysql using clv files
    11·1 answer
  • Does anyone know what this logo is??
    11·2 answers
  • The discipline of building hardware architectures, operating systems, and specialized algorithms for running a program on a clus
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!