1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
likoan [24]
4 years ago
12

How do you paste a picture? or a picture link?nvm i found out, but have some free points.

Computers and Technology
2 answers:
Airida [17]4 years ago
7 0

Answer:

aight thak u

Explanation:

Rom4ik [11]4 years ago
3 0

Answer:

Right click the picture and click copy then go to wherever you want to put it then right click there and press paste.

For the link just go to the url and highlight the entire url copy and paste that.

Explanation:

You might be interested in
Fiscal policy includes each of the following except? 1) the money supply. 2) taxes. 3) government spending. 4) the automatic sta
Rasek [7]

The fiscal policy directs the usage of government spending and tax policies to exploit economic conditions, especially macroeconomic circumstances. Fiscal policy includes each of the money supply.

<h3>What does the fiscal policy include?</h3>

The fiscal policy directs the usage of government spending and tax policies to exploit economic conditions, especially macroeconomic circumstances. These contain aggregate demand for goods and benefits, employment, inflation, and economic growth.

Some of the key goals of fiscal policy exist as economic stability, price stability, full employment, optimum allocation of resources, accelerating the rate of economic development, encouraging investment, and capital formation and growth.

Fiscal policy exists as measures employed by governments to stabilize the economy, especially by exploiting the levels and distributions of taxes and government expenditures. Fiscal measures exist frequently utilized in tandem with economic policy to attain specific objectives.

Large-scale underemployment, lack of coordination from the public, tax evasion, and low tax base are the other constraints of fiscal policy.

Therefore, the correct answer is option 1) the money supply.

To learn more about fiscal policy refer to:

brainly.com/question/6583917

#SPJ4

7 0
1 year ago
A technician has been asked to upgrade a processor and needs to do some research. The computer is just a couple of years old. Wh
DanielleElmas [232]

Answer:

The two best options can be processors like inlet i7 4.0 GHZ 8th generation processor, and two popular models are core and Pentium for inlet. Similarly for AMD we have 4 GHZ 8 core AMD processors. And two very popular examples are Athlon and Phenom.

You need to check the Graphics, clock speed etc. as well to end up with the best processor. Also make sure that it is motherboard compatible, and to the motherboard that you are having, If number of core is more and frequency is high, it means Processor is better, and same thing applies for generations as well.

Explanation:

The answer is self explanatory.

6 0
4 years ago
Lamp is an acronym for a complete solution of open source software that goes together to build a general purpose web server. whi
Westkost [7]
Answer choices?

LAMP contains <span>Linux, Apache, MySQL, and PHP.</span>
3 0
3 years ago
[Assembly Language]Extended Subtraction Procedure.Create a procedure named Extended_Sub --(Receives: ESI and EDI point to the tw
alex41 [277]

Answer:

Modern (i.e 386 and beyond) x86 processors have eight 32-bit general purpose registers, as depicted in Figure 1. The register names are mostly historical. For example, EAX used to be called the accumulator since it was used by a number of arithmetic operations, and ECX was known as the counter since it was used to hold a loop index. Whereas most of the registers have lost their special purposes in the modern instruction set, by convention, two are reserved for special purposes — the stack pointer (ESP) and the base pointer (EBP).

For the EAX, EBX, ECX, and EDX registers, subsections may be used. For example, the least significant 2 bytes of EAX can be treated as a 16-bit register called AX. The least significant byte of AX can be used as a single 8-bit register called AL, while the most significant byte of AX can be used as a single 8-bit register called AH. These names refer to the same physical register. When a two-byte quantity is placed into DX, the update affects the value of DH, DL, and EDX. These sub-registers are mainly hold-overs from older, 16-bit versions of the instruction set. However, they are sometimes convenient when dealing with data that are smaller than 32-bits (e.g. 1-byte ASCII characters).

When referring to registers in assembly language, the names are not case-sensitive. For example, the names EAX and eax refer to the same register.

Explanation:

5 0
3 years ago
________ includes reviewing transactoin logs and uses real-time monitoring to find evidence
denpristay [2]

Complete Question:

________ includes reviewing transaction logs and uses real-time monitoring to find evidence.

Group of answer choices

A. Log analysis

B. Network analysis

C. Code analysis

D. Media analysis

Answer:

B. Network analysis

Explanation:

Network analysis includes reviewing transaction logs and uses real-time monitoring to find evidence. Network analysis is a form of computer forensic service, which involves the scientific process of identifying, capturing and analyzing or examining data that are stored on digital devices in an electronic format, for the sole purpose of unraveling the truth about an allegation such as fraud, without preempting the outcome of the investigation.

Network analysis involves the use of network analyzers such as a sniffing and tracing tool to analyze or examine network traffic in real-time. Some examples of network analyzing tools are netdetector, tcpdump, pyflag, networkminer, xplico, tsat, wireshark, omnipeek, etc.

<em>Please note, network analysis is also known as network forensics in computer science.</em>

4 0
3 years ago
Other questions:
  • Which information technology job has the lowest predicted 10-year growth? computer programmer software developer computer suppor
    13·1 answer
  • The variety of theatre introduced in the 1960s that denotes semi-professional or even amateur theatre in the New York/Manhattan
    11·1 answer
  • This is not homework but how do you fix this I’ve tried everything
    9·1 answer
  • Cliff just started working with a client who has a very disorganized AdWords account. What’s an effective way for him to begin r
    15·1 answer
  • Text can be inserted into a presentation by
    7·1 answer
  • Application servers are usually grouped into two types: page-based and _____ systems.
    6·1 answer
  • 1. Why is it important for IT technicians to keep documentation on computers for which they are
    13·1 answer
  • Given an 10-bit two's complement binary number, what is the decimal value of the largest negative integer that can be represente
    10·1 answer
  • Can anyone give me $2 (Reddem code/Promo Code)​
    15·2 answers
  • Love me love me say that u love me fool me fool me go on and fool me : ) answer the question thx
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!