1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anika [276]
3 years ago
5

Type the correct answer in the box. Spell all words correctly.

Computers and Technology
1 answer:
Nimfa-mama [501]3 years ago
3 0

Answer:

Traffic

Explanation:

You might be interested in
10. Two technicians are discussing recycling specifications for refrigerant. Technician A says that refrigerant oil with 5,000 p
NARA [144]

Answer:

a

Explanation:

8 0
2 years ago
The process of providing only the essentials and hiding the details is known as _____. a. algorithm b. data structure c. abstrac
adoni [48]
The answer is (data) abstraction!
Hope it helped (:
3 0
3 years ago
Aiming high means???
Llana [10]

Answer:

in what context is it in? it could be aim high for goals set limits that are hard to reach but not impossible

Explanation:

5 0
3 years ago
“The software crisis is aggravated by the progress in hardware technology?” Explain with examples
exis [7]

Answer:

Basically, dealing with the "software crisis" is what we now call software engineering. We just see the field more clearly now.

What this crisis was all about is that in the early days of the modern technological era -- in the 1950s, say -- there was tremendous optimism about the effect that digital computers could have on society, on their ability to literally solve humanity's problems. We just needed to formalize important questions and let our hulking "digital brains" come up with the answers.

Artificial intelligence, for example, had some early successes in easy to formalize domains like chess and these sorts of successes led to lots of people who should have known better making extremely naive predictions about how soon perfect machine translation would transform human interaction and how soon rote and onerous work would be relegated to the dustbin of history by autonomous intelligent machines.

7 0
2 years ago
How can security professionals use software to recover stolen laptops ?
inna [77]

<u>Answer is:</u>

E). They monitor email traffic.

<u>Explanation:</u>


Track Your Device's IP Address with mail. If your laptop or smartphone was stolen, you can use a service like mail to find the IP address of your thief. When you log into those services from any computer, it logs the IP address used, and displays your last used IP in your account. So, these are source for finding the stolen laptop and smartphones.

I hope you got the idea. Thanks

3 0
3 years ago
Other questions:
  • Header and footer elements such as worksheet name, current date, and time are _____ elements, they change as your worksheet does
    12·1 answer
  • ___ is a career discipline focusing on helping companies use computer technology effectively.
    12·1 answer
  • Jennifer’s company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting
    7·1 answer
  • Pls answer fast in five mins​
    12·1 answer
  • Write a program named as calcPrice.c that formats product information entered by the user and calculate the total amount of purc
    5·1 answer
  • Best app in free to learn python
    7·1 answer
  • Write a program that will sort an array of data using the following guidelines - DO NOT USE VECTORS, COLLECTIONS, SETS or any ot
    10·1 answer
  • Edhesive intro to CompSci Test 7 answers pls
    5·1 answer
  • What does this function do in the code?
    5·2 answers
  • Which of these allows the programmer to put data inside a variable?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!