1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djyliett [7]
3 years ago
15

Type the correct answer in the box. Spell all words correctly.

Computers and Technology
2 answers:
jarptica [38.1K]3 years ago
7 0
This image is known as a ‘Bar Graph’.
suter [353]3 years ago
6 0

Answer: bar graph

Explanation:

You might be interested in
Host to IP address lookup and its reverse lookup option are very important network services for any size network. It is also how
Serhud [2]

Answer:

Domain Name System Security Extensions (DNSSEC)

Explanation:

3 0
3 years ago
Such a class might store information about the account balance, the name of the account holder, and an account number. What inst
nadya68 [22]

Answer:

an instance variable is a variable that is within a class but it is outside of constructors, methods or blocks.

the instance variables for the class bankAccount can be accountNumber, account holder name and balance.

below are the types and names declared to hold the information.

private string accountHolderName;

private int accountNumber;

private double balance;

note:

accountHolderName is a string data type because names are in alphabets.

accountNumber is an integer since they are in numbers.

balance is a double data type because it is a floating point number.

4 0
3 years ago
An embedded system describes computing technology that has been enclosed in protective shielding for security reasons. True or f
ddd [48]

The statement 'an embedded system describes computing technology that has been enclosed in protective shielding for security reasons is false.

In the field of computers and technology, an embedded system can be described as a small computer, more overly an integrated chip, that is enclosed in an electronic device in order for making the device to run. The small computer integrated into the device helps in regulating the device. The purpose of an embedded system is not for protective shielding or security reasons hence the statement above is false.

In an embedded system, a combination of computer processor, computer memory, and input/output peripheral devices is present that performs a dedicated function. Microcontrollers are used for the management of an embedded system.

To learn more about embedded system, click here:

brainly.com/question/13014225

#SPJ4

7 0
2 years ago
Describe two different examples of potential conflicts, and explain why these conflicts can have a negative impact on
Julli [10]

Answer:

A conflict is a situation in which two or more parties with opposing interests collide in their positions when trying to obtain a benefit or satisfy their needs. Thus, for example, if two people want to obtain the same thing, there will be a conflict of interest between those people, since only one of them will be able to satisfy their need.

Thus, two examples of conflict are, on the one hand, the clash of interests over a particular thing (two people want the same thing or position); and on the other, the conflict between two people with different and antagonistic personalities (an extroverted and noisy person against another introverted and reserved).

In all cases, a conflict between two people who are working on the same project could lead to a series of negativities that could affect its outcome.

6 0
3 years ago
You are trying to connect a new USB device to your computer. You install the driver and then connect the device to an open USB
nadezda [96]

Answer:

By order of increasing magnitude:

D. Make sure the USB device is plugged in properly.

A. Try a different USB cable.

B. Replace the USB device.

C. Install a new USB controller card.

Explanation:

Start with whatever is simplest first. Most errors are simply ID-10-T mistakes.

3 0
2 years ago
Other questions:
  • The _________ element enables developers to embed a self-contained web page within another html document.
    12·1 answer
  • Press the ____ key(s) to erase one character to the left of the insertion point.
    10·2 answers
  • .When an argument is passed ______________, the called method can access and modify the caller’s original data directly.
    8·1 answer
  • Claim: Raising the minimum wage does not help most minimum wage employees Reason: Many small businesses cannot afford high minim
    14·2 answers
  • you just bought a new hard drive for your computer you plan to use this as a second hard drive to store all your you made files
    6·1 answer
  • Hey I don’t have a question I’m just testing something on this app
    6·2 answers
  • Choose all items that represent characteristics of an HTML element. used to include additional information in an attribute consi
    15·1 answer
  • The chief intellectual property officer (CIPO) is responsible for collecting, maintaining, and distributing the organization's k
    14·1 answer
  • What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records
    8·1 answer
  • Create a Flowchart and write pseudocode for a program that allows the user to enter two integer values: a and b.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!