1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
3 years ago
5

Science can give us

Computers and Technology
2 answers:
Licemer1 [7]3 years ago
7 0

yup i totally agree

kondor19780726 [428]3 years ago
4 0
Both new understanding and new information
You might be interested in
A technician is assigned a task to configure a new server with six hard drives. The senior administrator requested the technicia
Doss [256]

Answer:

The answer is "Option C".

Explanation:

It is a way of saving data for additional protection, and it provides an efficiency to connect the lots of hard discs. It uses the optimization techniques, named stages, which is used in unique counts, that will be considered from 0 to 9, and other were incorrect, that can be described as follows:

  • The RAID 3 offers synchronization rotation to all discs.
  • The RAID 5 uses parallel disc patterning.
  • The RAID 0 divides data into the blocks.
4 0
3 years ago
Can someone please help me write a code for this
Anon25 [30]
When in doubt, decompose (break into smaller parts) the problem!

You need to display a GUI.
You need to accept input from two widgets and convert it integers.
You need to add a range of numbers.
You need to concatenate a string of what you're doing with the addition.
You need to display an answer in a widget and maybe redraw the window.

I've been having success copying the assignment into my source file and decomposing it as comments to frame out my program.
5 0
3 years ago
Windows stores information from the Credential Manager application in secure folders called
Delicious77 [7]

Windows stores information from the Credential Manager application in secure folders called<u> VAULTS.</u>

<u></u>

Explanation:

  • A credential vault is a database used to store passwords and similar cryptographic key material.
  • The most common data stored in a credential vault are current and historical passwords to privileged accounts.
  • All credentials are saved in special folders on the computer, a place called Vaults. Moreover, you can back up all credentials to a file and restore them on to different computer.
  • Vault is a shareware program that acts as a bank vault, or safe, where you can keep you private information or files hidden and secure.
  • Everything in the vault is protected with an advanced encryption, and requires a password (your password) to open the vault to access the information.
8 0
3 years ago
Need help asap please​
Fofino [41]
Because you can make it to where they cannot find or see or look or talk or anything on your profile it can cut off Comunication from the person. It can also protect your safety!
6 0
2 years ago
The name for the instructions you write to a computer in a program
aliina [53]

Answer:

Code

Explanation:

The code is instructions that you can write yourself or download from online

4 0
2 years ago
Read 2 more answers
Other questions:
  • Which of the following variable declarations is a correct assignment?
    14·1 answer
  • The FaceSnap app has permission to use many devices on your smartphone, including the camera. A data privacy concern that arises
    6·1 answer
  • How did the invention of the printing press lead eventually to an increase in the diversity of religious expression?
    7·1 answer
  • Write a C++ program that allows the user to enter double values. Display one of two messages: "The first number you entered is l
    9·1 answer
  • You can rotate a selected graphic by dragging a ________ rotation handle
    13·1 answer
  • 4.12 LAB: Using math methods Given three floating-point numbers x, y, and z, output x to the power of z, x to the power of (y to
    10·1 answer
  • (Correct Answer Recieves Brainliest)
    8·2 answers
  • How can I master networking my home/business computer(s) - Tv's - iot devices and make the whole system as secure as possible?
    12·1 answer
  • Consider the following code using the posix pthreads api:
    14·1 answer
  • What is the name of the method generated when you double-click a button named btnprocess in the form designer?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!