1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olya-2409 [2.1K]
3 years ago
5

Please help meh T^T Which of the following describes an application error? Select 2 options.

Computers and Technology
2 answers:
Lena [83]3 years ago
8 0

Answer:

"Every time you try to run your new game, it crashes after displaying the opening screen"

"After a recent Windows update, you can no longer access the internet on your laptop"

Explanation:

BartSMP [9]3 years ago
3 0
Answer: 4 and 6 those are right
You might be interested in
Which of the following is NOT AN EXAMPLE of personal identifying
alexgriva [62]

Answer:

Your Social security number .

Explanation:

  • Personal information is the information of. a person.
  • It includes The name,Address,number etc of the person .
  • the PAN,Debit and credit card number is also included .

6 0
3 years ago
Read 2 more answers
Compare and contrast inertial confinement with thermonuclear reactors.
astra-53 [7]
ICF is a type of fusion energy research that attempts to initiate a nuclear fusion reaction by heating and compressing a fuel target. Its normally in the form of a pellet that most often contains a mix of deuterium and tritium.

A nuclear reactor is a device used to initiate and control a sustained nuclear reaction. Nuclear reactors are used at nuclear power plants for electricity generation. 

Compare: they are both nuclear, they both produce energy, they both are used at power plants.

Contrast: ICF uses fusion, while a nuclear reactor is used to control a sustained nuclear reaction. 

This is all I can help with. By the way, are you in rocket science? 'Cause this stuff is hard.
8 0
3 years ago
What are the pros and cons of using ICT​
Setler79 [48]

Answer:

Communication - Speed / time – money can be saved because it's much quicker to move information around. ...

Globalization - Video conferencing saves money on flights and accommodation. ...

Cost effectiveness - It feels free to send an email (although it isn't); it's without doubt cheaper than phone calls.

Explanation:

4 0
3 years ago
An example of software is a _____.<br><br> spreadsheet<br> mouse<br> track ball<br> printer
algol13

An example of software is a spreadsheet :)

8 0
3 years ago
Which term describes a secure, individual, private cloud-computing model hosted within a public cloud?
grin007 [14]

The term that describes a secure, individual, private cloud-computing model hosted within a public cloud is A hybrid cloud.

<h3>What is this cloud about?</h3>

A hybrid cloud is known to be a system or a model which is said to be a form of a private cloud that is linked with public cloud infrastructure, and it is one that tends to give room for an organization to act workloads in two environments.

Note that In this model, the public cloud is known to be one that is seen and it is one that becomes an extension of the private cloud to make a single, uniform cloud.

Hence, The term that describes a secure, individual, private cloud-computing model hosted within a public cloud is A hybrid cloud.

Learn more about hybrid cloud from

brainly.com/question/27838623

#SPJ1

7 0
1 year ago
Other questions:
  • The ____ file permission category in unix/linux systems typically entails all permissions and is designated by the letter u.
    7·1 answer
  • "The fact that we could create and manipulate an Account object without knowing its implementation details is called"
    9·1 answer
  • Write an application that determines the value of the coins in a jar and prints the total in dollars and cents. Read integer val
    6·2 answers
  • One blog may have a greater social influence than another when it has_______?
    12·2 answers
  • PLEASE HELP. I’ll mark you BRAINLIST <br> Please read the comment under this question
    9·1 answer
  • What is the<br> binary code<br> for<br> "DMS"?
    8·1 answer
  • How do you customize calendar view​
    9·2 answers
  • 1) SuperFetch is a memory-management technique that a) determines the type of RAM your system requires. b) makes the boot-up tim
    7·1 answer
  • Which are examples of basic text structures? Check all that apply.
    8·2 answers
  • If a movie, song, or book is offered for free, is it malware?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!