1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antiseptic1488 [7]
3 years ago
5

Production cost can be reduced using technology. Explain

Computers and Technology
1 answer:
Black_prince [1.1K]3 years ago
3 0

Explanation:

By reducing the time the use on unnecessary tasks. And you would be able to operate on using your time on beneficial tasks

You might be interested in
Caleb is working in an Excel spreadsheet and realizes that he incorrectly spelled a word he used in multiple cells. Which can Ca
Irina18 [472]
Given the situation above regarding the error that Caleb made in the spelling of a particular word which was repeated in multiple cells, the steps that he can do in order to correct this are the following:
1. G<span>o to Review, Spelling, and select Change each time the error is found.
2. G</span><span>o to Home, Editing, Find, search for the incorrect spelling, and Replace to replace it with the correctly spelled word.
Hope this helps.</span>
5 0
3 years ago
What is the default zoom percentage in Word?<br><br> 50%<br> 100%<br> 150%<br> 200%
Hunter-Best [27]

Answer:

its 100%

Explanation:

5 0
3 years ago
Read 2 more answers
MD5 uses a hash value to create a hash which is typically a 32 character hex number and how many bits?
ryzh [129]

Answer:

128 bits

Explanation:

The MD5, which is the acronym for Message-Digest algorithm 5, invented by a professor of MIT, Ronald Rivest, is a cryptographic hash algorithm that creates a 128 bit hash value and is typically represented as a 32 character hex number. MD5 is the improved version of MD4 which was also created by the same professor.

Following is an example format of an MD5 hash;

<em>ef55d3a698d289f2afd663725127bccc</em>

MD5 has been proven to have security issues. One of these issues is called collision attack - a situation where the same hash is produced for different input data.

8 0
4 years ago
Describe any five Morden application areas of computer​
Alecsey [184]

Answer:

Some of the application areas of computer are 

1.banking,

2.education,

3.industries,

4.entertainments,

5.hospitals,

7 0
3 years ago
What’s let’s you see your mouse on the screen in order to click icons, buttons , and menus
tatyana61 [14]

Answer: Easy one.

Explanation:

This would be the OS. The OS has a mouse cursor for you to use in Windows, and Linux, it's the same thing for some BIOS'es aswell, and this goes for setting up Windows, or Linux off of a flash drive or CD.

7 0
3 years ago
Other questions:
  • Given a normally distributed data set of 500 observations measuring tree heights in a forest,
    6·1 answer
  • Being technologically literate requires being able to ______.
    11·2 answers
  • Which type of computer graphic can be resized without affecting image quality or getting distorted?
    9·1 answer
  • A programming and software development professional would most likely help with
    10·1 answer
  • Write a program that inputs a time from the console. The time should be in the format "HH:MM AM" or "HH:MM PM". Hours may be one
    6·1 answer
  • How to reset maintenance light on toyota camry?
    12·1 answer
  • How much heat is needed to raise the temperature of 7g of water by 15oC?
    6·1 answer
  • I’m trying to make the button change random colors every time you hover over it, yet I can’t seem to understand the procedure...
    8·1 answer
  • I don't understand this
    10·1 answer
  • What sets Web pages apart from other documents is that they contain a special kind of text called ___, which is document text th
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!