1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LiRa [457]
3 years ago
9

What was your learning target for today

Computers and Technology
2 answers:
Aleks04 [339]3 years ago
8 0

My learning target for today are the follows :

  1. I learn at least 2 words meaning that I don't know.
  2. I learn coding daily at least 10mins
  3. Some quotes
Over [174]3 years ago
7 0

Answer:

explain

Explanation:

You might be interested in
Julie has a difficult time seeing her computer Screen and uses adaplive technology tools to help he see better. One of the tools
andreyandreev [35.5K]

Answer:

200%

Explanation:

While Julie has some difficulties reading short words, she can zoom the size of the texts by two hundred percent to make the process faster. A hundred percent or less would have much more difficulty reading short words.

4 0
3 years ago
Read 2 more answers
A network host with an IP address of 192.168.10.200 wants to send a message to a destination computer with an assigned IP addres
Mariulka [41]

Answer:

A Subnet Mask

Explanation:

A Subnet mask is used by the TCP/IP protocol to determine whether a host is on the local Subnet or on a remote network.

In TCP/IP, the parts of the IP address that are used as the network and host addresses are not fixed, so the destination host address 192.168.10.100 cannot be determined by the network host (192.168.10.200) unless it has more information. This information is supplied in another 32-bit number called a Subnet mask.

4 0
4 years ago
HELP BRAINLST!!<br><br> How is labor already being automated in supermarkets?
11Alexandr11 [23.1K]

Answer:

Self-checkouts as well.

Explanation:

6 0
3 years ago
Define the types of objects that can be stored in active directory, such as user or computer accounts.
nevsk [136]
<span>Schema classes define all objects that AD can handle.</span>
8 0
4 years ago
A ______ oversees the planning and implementation of sophisticated security measures to block unauthorized access but at the sam
meriva
A-database administrator
8 0
3 years ago
Other questions:
  • Almost all PCs have this type of serial connector
    8·1 answer
  • Regarding computer protection, quarantining is defined as ________. Select one: A. placing a found virus in a secure area on the
    13·1 answer
  • Which of the following is the largest disadvantage of wind power?
    12·2 answers
  • You have an old photograph that you want to incorporate in a brochure for your antique business. To convert the photo into digit
    9·2 answers
  • When performing actions between your computer and one that is infected with a virus, which of the following offers NO risk of yo
    11·1 answer
  • A kerberos __________ is a set of managed nodes that share the same kerberos database.
    10·1 answer
  • Beverly is creating a website for her new clothing company. Aside from including photographs, how can she use the index page to
    8·2 answers
  • A host device needs to send a large video file across the network while providing data communication to other users. Which featu
    8·1 answer
  • Advancing technology has made life easier for people and businesses today. Imagine that you have to work for an entire day witho
    11·1 answer
  • There is a group of 10 people who are ordering pizza. If each person gets 2 slices and each pizza has 5 slices, how many pizzas
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!