1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Likurg_2 [28]
3 years ago
8

What aspect should you consider before adding pictures to a document?

Computers and Technology
2 answers:
Luden [163]3 years ago
8 0

Answer:

information?

Explanation:

picture are there to give a visual or make the document more appealing. if your wording and information isnt up to date or reasonable people wont lean to what you are saying as much.

BaLLatris [955]3 years ago
7 0

Answer:

Information

Explanation:

You might be interested in
Please give me a answer correctly​
sergiy2304 [10]

Answer:

C. Bob (Robert) Gaskins.

A. The selected cell.

C. The title box.

8 0
2 years ago
A _______ is a host that runs software to provide information, such as web content, to other hosts.
kolezko [41]

Answer:

The correct answer to the following question will be "Server".

Explanation:

  • Any device with a network connection is a host, but only hosts which accept other device connections (climates) are Servers.
  • All servers were hosts, but the servers aren't all hosts.
  • Each host network is a node, however not all network nodes are a host. Networking hardware such as modems, hubs, and network switches are not necessarily network addresses allocated (except for administrative purposes sometimes).
8 0
4 years ago
Type of malware that is spread when you distribute
vladimir1956 [14]
Trojans, normal viruses, etc. Anything can and could hop on to the files you send depending on the websites and if you don't have a firewall.
3 0
4 years ago
B. Identify the purpose of each of the following types of utility programs
olya-2409 [2.1K]

<u>These are the types </u>:

1. Antivirus software : Detects and removes virus and malwares from   computer system.

2.Disk defragmenter : Reduces the fragmented space in the disk.

3.Disk cleaner : Build to find and delete unwanted files to free the disk space.

6 0
4 years ago
84.6% complete question a network administrator is installing a device that uses redundant array of independent disks (raid) tec
Alja [10]

The device that this network administrator is most likely installing in the infrastructure is a Network Attached Storage (NAS).

<h3>What is a Network Attached Storage (NAS)?</h3>

A Network Attached Storage (NAS) can be defined as a file-dedicated storage device that is designed and developed to enable multiple end users and other heterogeneous client devices to store, share and retrieve data anywhere from a centralized disk, especially through a network.

In this context, we can infer and logically conclude that a Network Attached Storage (NAS) is the device that this network administrator is most likely installing in the infrastructure because it doesn't require licensing and the data stored on it at the file level can be accessed anywhere.

Read more on Network Attached Storage here: brainly.com/question/14456295

#SPJ1

3 0
2 years ago
Other questions:
  • Assume that word is a variable of type String that has been assigned a value. Assume furthermore that this value always contains
    13·2 answers
  • ___ refers to all aspects of managing and processing information using computers and computer networks
    13·1 answer
  • Nathan notices his computer System is slowing down when he tries to copy documents to it he also gets a prompt I warned him that
    7·1 answer
  • A cpu with an external clock speed of 2 ghz and a 64-bit data bus can (theoretically) transfer how much data per second?
    8·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an
    5·1 answer
  • Will my ethernet adapter stop eveyone from getting WiFi if connected to my laptop ?
    5·1 answer
  • What are the biggest problems facing the criminal justice system in the area of computer crime
    10·2 answers
  • In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.
    13·1 answer
  • All the following are the basis of the World Wide Web except:
    14·2 answers
  • Write 10 sentences of your own and underline the verb.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!