1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olegator [25]
3 years ago
10

12.

Computers and Technology
1 answer:
melisa1 [442]3 years ago
7 0
The correct answer is 1.6
You might be interested in
What do you hope that people see in your digital footprint 5 years from now? ​
nikdorinn [45]

Answer:

I hope they see me playing with my dog (who died a few months ago) Malikeye

Explanation:

none :)

5 0
2 years ago
Eli needs to export files from his mailbox into a single file that is portable and can be backed up to removable media. Which fi
slava [35]

Answer:

PST

Resource:

This question has already been answered here: brainly.com/question/18415952

Explanation:

PST is the personal storage table, which is a file built by Microsoft to store data from outlook and other services too.  Really quick, this may or may not be an option that you are looking for but, what I would do in my opinion would be to use the PST and export it on a removable USB, since USBs are removeable media.

6 0
3 years ago
Computer crimes are a big concern since the creation of innovative technological advances; which is/are examples of computer cri
Natali [406]

Answer:

The answer is E: All of the above

Explanation:

All of the above scenarios are examples of serious computer crimes. They are crimes that exist in the offline world but take place online. Sexual predators, for instance, mostly take advantage of the anonymity provided by the internet. They often target dating sites and find suitable victims. Cyber bullying and Cyber stalking are just as harmful as any other computer crime. Industrial Espionage may also somehow fall into this category. Less frequently, criminals may steal documents and computer files or more often, illegally gain access to company’s trade secrets on computers and servers.

3 0
3 years ago
Read 2 more answers
The while loop and the do loop are equivalent in their expressive power; in other words, you can rewrite a while loop using a do
sleet_krkn [62]
I think False...

I hope this helps
8 0
2 years ago
Which type of approach grew out of the development of computers, where even complex behavior such as learning, remembering, cate
mestny [16]

Answer:

In studies of technology and innovation, it is common to distinguish between different levels of technology. A common distinction is between technologies as processes or products and technology systems. Another distinction is between technology s hardware, software and orgware; sometimes socioware is added as yet another layer or category. In he studies, the focus is usually on a particular technology, either a process technology or product

Ž echnology with product technology broadly de In studies of technology and innovation, it is

common to distinguish between different levels of technology. A common distinction is between technologies as processes or products and technology. Another distinction is between technology as hardware, software and orgware; sometimes socioware is added as yet another layer or category. In the studies, the focus is usually on a particular technology, either a process technology or product.  

Explanation:

7 0
3 years ago
Other questions:
  • In your presentation you added a text box to?
    5·1 answer
  • Which of the following was one of the first internet search engines? A. archie B. google C. Yahoo D.ask
    7·1 answer
  • Which part is the author’s address?
    5·1 answer
  • Write a program to calculate and return total surface area of a box using FUNCTION _END FUNCTION.​
    15·1 answer
  • A nonpipelined system takes 300ns to process a task. The same task can be processed in a 5-segment pipeline with a clock cycle o
    10·1 answer
  • A noisy signal has been uploaded to D2L in the files fft_signal.mat and fft_signal.txt.Write a program to estimate the power spe
    10·1 answer
  • Write a Java class with the following methods: getArray(int numStrings) is an instance method that takes command line input (use
    11·1 answer
  • Find the basic period and basic frequency of the function g(t)=8cos(10πt)+sin(15πt)
    9·1 answer
  • Who innovated an aeroplane? ​
    5·1 answer
  • Tips for staying safe using social media. Using in your own words.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!