1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alina1380 [7]
3 years ago
9

Suppose you present a project and your supervisor comments that the graphics need to be a higher quality and suggests you replac

e a circuit board. To what circuit board is your supervisor referring?
graphics card

video card

sound card

system card
Computers and Technology
2 answers:
Vlada [557]3 years ago
6 0

Answer:

graphics card

Explanation:

guajiro [1.7K]3 years ago
4 0

Answer:graphics card

Explanation:

You might be interested in
When a user inserts a PivotTable, where will it be inserted?
Alexeev081 [22]

Answer:

depends on whether the Pivot Table is inserted into the current worksheet or a new worksheet and the current location of the cursor.

Explanation:

Pivot tables are short tables with few columns and rows out of the original set of rows and columns. And they are being governed by the report filter, and column labels can also be added, as well as rules can be applied to value, but for formulas, we need to create the formula field. However, it can be placed in the current worksheet or a new worksheet and the current location of the cursor.

3 0
3 years ago
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
julia-pushkina [17]

Answer:

Option (A) is the correct answer.

Explanation:

A Computer system can be the target for the crime on which a criminal can acquire the information from the computer system which is stored on it. A Criminal is targeting the system with the help of some software that is entered on the computer system through a network.

In the above question, paragraphs are describing the content related to the crime which targets the computer system. This is a concept of a "computer as target". Hence option "A" is the correct answer while the other is not valid because--

  • Option b suggests the concept behind the storage device of a computer but in the question, it is about the crime of a computer.
  • Option c suggests the concept behind the computer is a criminal but in the question, it is about the crime of a computer.
  • Option d suggests the concept behind the communication of a computer but in the question, it is about the crime of a computer.
4 0
4 years ago
How many different Microsoft Windows file types can be infected with a virus?
vagabundo [1.1K]
Phishing, scam, Fraud, just to get to hack your computer.
6 0
3 years ago
A data center designer requested additional lighting for the entrance to the data center as well as the removal of a object whic
Ira Lisetskai [31]

Answer:

SURVEILLANCE-SPECIFIC DESIGN.

Explanation:

Defensible space offers a series of architectural guidelines that can be used in the design of new urban residential complexes to promote both the residential group’s territorial claim to its surroundings and its ability to conduct natural surveillance. The designs are: site interrelationship design, site design, street design and surveillance-specific design.

Surveillance-specific design can be used to increase general visibility by providing adequate lighting, by reducing or eliminating physical barriers to visibility, and by the visibility-promoting location of key areas (entrances, lobbies, elevator waiting areas, parking areas e.t.c.) so as to be directly visible from as many viewpoints as possible.

Since the data center designer requested additional lighting for the entrance to the data center as well as the removal of a object which is blocking security's view of the entrance, then it is an example of SURVEILLANCE-SPECIFIC DESIGN.

6 0
3 years ago
Ujqwgydft frrhyy4e uvbw vhrwbhv vbyrewblv?
pishuonlain [190]

Answer:

??

Explanation:

can you be more specific please! i can't read gibberish

8 0
3 years ago
Other questions:
  • A _____ is an area hosted by a Web server in which project members and colleagues can share documents, models, photos, and other
    6·1 answer
  • which field in the contact form is used to control the order in which contacts are displayed in the current view
    15·1 answer
  • You notice your glove is torn; what should you do
    14·2 answers
  • In Microsoft Excel, you have a large dataset that will print on several pages. You want to ensure that related records print on
    13·1 answer
  • Which of the following statements about certificates is true?
    14·2 answers
  • Dynamic addressing: __________.
    12·2 answers
  • Dictionaries You are given a dictionary consisting of word pairs. Every word is a synonym the other word in its pair. all the wo
    9·1 answer
  • Service and software companies typically have a high return-on-assets ratio because they require lower blank as compared to manu
    11·2 answers
  • 5.5 Learning Objective: To demonstrate that the student understands the definition of Big O. To demonstrate that the student und
    11·1 answer
  • In what year was the earliest documented use of the word computer?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!