1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex
3 years ago
13

Taking a group of recipes and identifying the similarities is an example of _____.

Computers and Technology
1 answer:
drek231 [11]3 years ago
4 0

Answer:

Pattern recognition

Explanation:

Y not

You might be interested in
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
When _______ wordart, you need to consider both the font size of the text and the size of the text box that contains wordart?
padilas [110]
The correct answer is resizing. If you're making a logo and creating wordart. you have to care about resizing because the art needs to be clearly visible and appealing no matter the size. If you place it in a box, you have to care that it doesn't go over the edges of the box or anything similar that might seem appalling.
4 0
4 years ago
Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; what is the nonkeyboard method
Sergio [31]
The correct answer of the given question above would be second option: SOURCE DATA ENTRY. <span>Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; the non keyboard method is called the source data entry.</span>
4 0
4 years ago
a user complains he cannot access a particular website, although he is able to access other websites. At which layer of the OSI
Usimov [2.4K]

Answer:

Layer 7: Application Layer

Explanation:

Layer 7 is the Application layer and the website that causing issue is used through an app. Making it Layer 7 Application.

8 0
2 years ago
Databases that carry their data in the form of tables and represent relationships using foreign keys are called _____ databases.
Butoxors [25]
Relational databases.
7 0
4 years ago
Other questions:
  • Most network cards contain a port that accepts a(n) ____, which looks similar to a telephone connector but is larger.
    14·1 answer
  • What is the name of small programs stored on the hard drive that tell the computer how to communicate with a specific hardware d
    5·1 answer
  • Which of the following is where you can save, select a template, change document properties, and close or exit excel?
    8·1 answer
  • The hardware components of a computer system interact with each other by using which of the following?
    14·2 answers
  • When using ntfs as a file system, what can be used to control the amount of hard disk space each user on the machine can have as
    8·1 answer
  • One foot equals 12 inches. Write a function named feet_to_inches that accepts a number of feet as an argument and returns the nu
    15·1 answer
  • To convince the server that a user is authentic, the authentication server creates a _________ that contains the user's ID and n
    13·1 answer
  • Why a commerce student must learn about SDLC (Software Development Life Cycle) and its phases?
    12·1 answer
  • How does equal employment opportunity apply to nursing practice?​
    9·1 answer
  • What is the output?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!