1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nutka1998 [239]
3 years ago
6

Which of these is the term for a result that is not expected or intended?

Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
5 0
No options. Well it would be a surprise.
You might be interested in
What feature, once activated, can't be disabled without reinstalling all domain controllers within a forest?
larisa86 [58]

The feature in which when once has activated can’t be disabled without having it to be reinstalled in all of the domain controllers inside the forest is the Active Directory Recycle Bin. The Active Directory Recycle Bin is responsible for having to minimize the service directory by having to enhance the ability of preserving and to restore deleted objects without being able to restore it with the use of the active directory data.

8 0
3 years ago
The safest action to take if someone claiming to be from your bank calls you to ask for account information is to
Fofino [41]
Hang up, and inform your (real) bank that someone may attempt to steal your identity and your money.
6 0
3 years ago
Read 2 more answers
3. What role can the school play in order to avoid and act against cyber bullying?​
Snowcat [4.5K]

Answer:

below

Explanation:

really nothing because you cant prevent cyberbullying in any way its going to happen at anytime anywhere you can act against it by doing a orginazation to try and prevent it.

6 0
3 years ago
Unauthorized use of information, materials, devices, or practices in completing academic activities is generally considered:
sasho [114]

Answer: Cheating

Explanation: Cheating involves unauthorized use of information, materials, devices, sources or practices in completing academic activities. For example, copying during an exam that should be completed individually is an unauthorized practice, and, therefore, is considered cheating.

8 0
2 years ago
Read 2 more answers
The algorithm below is used to simulate the results of flipping a coin 4 times. Consider the goal of determining whether the sim
Leni [432]

Answer:C

Explanation:

5 0
3 years ago
Other questions:
  • The control programs managing computer hardware and software perform the _________ function to control and prioritize tasks perf
    8·1 answer
  • U2- an example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
    6·1 answer
  • A word object in an excel worksheet to activate the word features
    9·1 answer
  • Claire is trying to listen to her history professor's lecture, but her mind keeps wandering to thoughts about her plans for the
    5·1 answer
  • The ________ maps the software architecture created in design to a physical system architecture that executes it. (Points : 3) a
    14·1 answer
  • What are the steps for inserting an internal link?
    15·2 answers
  • What steps can be used to password-protect a worksheet?
    14·1 answer
  • If String str = "Computer Science";, then what is the value of str.substring(10);? ​
    6·1 answer
  • Question 1 (1 point)
    13·1 answer
  • Two ways of selecting text with mouse​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!