1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leni [432]
3 years ago
12

Plain text and ASCII text are the same thing. true or false

Computers and Technology
1 answer:
lesantik [10]3 years ago
5 0

Answer:

True

Explanation:

You might be interested in
Which two statements are true about algorithms?
DENIUS [597]

Answer:

I. Algorithms can be written using pseudocode.

II. Algorithms can be visualized using flowcharts.

Explanation:

An algorithm can be defined as a standard formula or procedures which comprises of set of finite steps or instructions for solving a problem on a computer. The time complexity is a measure of the amount of time required by an algorithm to run till its completion of the task with respect to the length of the input.

The two statements which are true about algorithms are;

I. Algorithms can be written using pseudocode. A pseudocode refers to the description of the steps contained in an algorithm using a plain or natural language.

II. Algorithms can be visualized using flowcharts. A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

Basically, a flowchart make use of standard symbols such as arrows, rectangle, diamond and an oval to graphically represent the steps associated with a system, process or workflow sequentially i.e from the beginning (start) to the end (finish).

3 0
3 years ago
Read 2 more answers
The 60-watt light bulb has a 400 hour life expectency how much will it cost to operate during its time
expeople1 [14]

Answer:

$2.40

Explanation:

the unit electricity bill is kilo watt hour.

The 60-watt light bulb has a 400 hour life expectency means it will consume

60×400/1000 = 24 KWh units of electricity. Let us suppose each unit of electricity costs is 10 cents.

Then 24×10 = 240 cents  = $2.40

5 0
3 years ago
Which directory in the FHS stores programs and configuration information that can only be executed and modified by the root user
dlinn [17]

Answer: /sbin

Explanation:

In Linux, FHS describes the directory content and the way in which Operating System files are displayed to the user.

/sbin is a directory that contains executable programs. s/bin is the short form of system binaries. System binaries require root rights to perform specific tasks. /sbin contains binaries that are crucial to boot the system and also to recover and restore the system. /bin directory also contains the commands to boot the system but the main difference between both is that /sbin programs can only be executed by the root user. Examples are fdisk, fsck, root,halt, init, grub, ifconfig.

4 0
3 years ago
A software program that allows you to create professional looking multimedia presentations. Question 1 options: Excel 365 Word 3
maks197457 [2]

Powerpoint is a program that allows  us to create professional looking multimedia presentations.

<h3>What is Multimedia presentations?</h3>

A multimedia presentation is a way of communication where we use audio,vedio,arts,drawings and other various ways to present communcations.

<h3>Why Ms-PowerPoint ?</h3>

Ms-PowerPoint consists of some simple and understandable features to make notes through slides create vedio and vedio editing, Coral Draws Audio editing etc.

We can create banners,record vedios,draw and design with the help of tools provided by powerpoint.

Powerpoint also helps to transform boring presentation to an eye catching presentation.

Learn more about PowerPoint here:brainly.com/question/10117380

4 0
2 years ago
What risks, threats, and vulnerabilities are prominent with wlan infrastructures?
vovangra [49]
The threats as well as the risk and vulnerabilities are present with the WLAN. The WLAN would encounter security issues with the range of the signal which is wireless, SSID broadcasting, password security and the packet sniffing or the capturing of signal.
4 0
4 years ago
Other questions:
  • Ming is building an inexpensive computer to use for her online classes, and needs to purchase Windows. What is the most cost-eff
    8·1 answer
  • The rod and crankshaft convert the up-and-down motion of the piston into
    12·2 answers
  • HELP ASAP
    10·2 answers
  • What is the first thing you should do when troubleshooting a computer problem
    5·2 answers
  • function calculate () { var s = 2; var x = 2; var y = 3; if (x &gt; 4) { s=s+ 2; } else if ( y &gt; 4) { s=s+ 4; } else { s+=3;}
    11·1 answer
  • Which function of a word processing program enables you to apply a preset formatting
    5·1 answer
  • In the URL, what is the subdomain and what is the domain name?
    5·1 answer
  • A personal computer (pc) or ____ is a small computer system designed to be used by one person at a time.
    12·1 answer
  • A mesh network topology allows all computers to be directly connected. True or False
    9·1 answer
  • Find 10 real world challenges and their corresponding solutions
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!