1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nydimaria [60]
3 years ago
15

Which of the following is an example of an open-ended question?

Computers and Technology
1 answer:
Tpy6a [65]3 years ago
4 0

Answer:

<em>What are your thoughts about this?</em>

Explanation:

A question that can be answered with yes or no is a closed question.

You might be interested in
What are the pieces of information that describe the appearance of a cells content
Allushta [10]

Answer:

Information about the parts of a cell, its location and role will help describe the appearance of a cell's content.

Organelles are cell structures that include the nucleus, cytoplasm, cell membrane among others. One can view these using a light microscope.

1. Cell Membrane is a fluid mosaic. It is the outer boundary of the cell.

2.Cytoplasm is the fluid inside the cell. It is located between the nucleus and the cell membrane.

3.Nucleus is the control center of the cell and is located at the center.

4 0
2 years ago
after a few weeks of using facial recognition login, your infrared camera fails, and you are asked to enter your pin. because it
riadik2000 [5.3K]

The reason that you have not been locked out after several failed PIN login attempts is that your laptop does not have a TPM chip, and you have not set up BitLocker for lockout.

Technology known as Trusted Platform Module (TPM) is made to offer hardware-based, security-related functionality. Designed to perform cryptographic operations, a TPM chip is a safe crypto-processor. Malicious software cannot interfere with the TPM's security capabilities, and the chip has numerous physical security features to prevent tampering. Utilizing TPM technology has a number of major benefits, including the following:

  • Cryptographic keys should be created, stored, and used sparingly.
  • Utilize the burnt-in RSA key of the TPM to authenticate platform devices using TPM technology.
  • By recording security metrics, you can assist in ensuring platform integrity.

To learn more about TPM click here:

brainly.com/question/10742732

#SPJ4

7 0
1 year ago
"3. 4. Simple number search We will pass you 2 inputs an list of numbers a number, N, to look for Your job is to loop through th
Arisa [49]

Answer:

Following is given the detailed solution to the question given.

  • First image contains source code. All the steps are described with help of comments.
  • Second image contains the output or the program given.

I hope it will help you!

Explanation:

4 0
3 years ago
What is 1gb in bits?​
Irina-Kira [14]

Answer:

8e+9

Explanation:

3 0
3 years ago
Read 2 more answers
suppose task c has two predecessor tasks: task a and task b. task a ends on may 8 and task b ends on may 13. when can task c beg
san4es73 [151]

Suppose task c has two predecessor tasks: task a and task b. task a ends on may 8 and task b ends on may 13. The time that task c can  begin is may 14.

<h3>What does task mean in its other sense?</h3>

It is seen as Assignment, chore, duty, job, and stint are a few examples of common synonyms for task. Task implies work that is imposed by a person in authority, an employer, or circumstances, even though all of these words mean "a piece of work to be done."

Note that you may be asked to write a letter, a feature article, an editorial, or a speech. who you're pretending to write to in response to the prompt. Hence starting by on the 14th is advisable.

Learn more about task  from

brainly.com/question/12831236
#SPJ1

8 0
1 year ago
Other questions:
  • To display or distribute information from a database, programmers or database administrators create ___ .
    12·1 answer
  • Queue is the LIFO structure.<br><br> o True<br><br> o False
    8·1 answer
  • The smallest building block of a wireless lan is a ______.
    5·1 answer
  • A thermostat with the processor program to control temperature is an example of what kind of computer
    6·1 answer
  • Why are computers complicated?
    15·1 answer
  • Why is know app downloading in my android phone even if I have 900 MB ???
    8·2 answers
  • Create a text file named employee.dat containing the following data: b. Write a C++ program to read the employee.dat file create
    6·1 answer
  • 20 POINTS!!! I NEED HELPP
    6·2 answers
  • Jim is working on a network design for a small office running a Windows file and printer server with Internet
    15·1 answer
  • A large global retail corporation has experienced a security breach, which includes personal data of employees and customers.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!