1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melamori03 [73]
3 years ago
6

Which best describes most television in the 1940’s and 1950’s? A. 24 hour B. Cable C.black and white D. Color

Computers and Technology
2 answers:
ale4655 [162]3 years ago
8 0
The answer is C) black and white
IrinaVladis [17]3 years ago
6 0

the answer is C) black and white
You might be interested in
What is does ram means,??
jenyasd209 [6]
It means to roughly force something into place or an ungelded boy sheep XDDD
7 0
2 years ago
Read 2 more answers
The navigation bar appears in the same position on each page and uses the same colors, fonts, and font styles.
Ivan

Answer:

true

Explanation:

I think that's what it has been in my time of classes

3 0
2 years ago
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?
ehidna [41]

Answer:

The correct answer to the following question will be "Secure".

Explanation:

This file includes information about the rights of verification and authorization.

  • It will be used primarily for monitoring the use of authorization schemes.
  • It holds all communications related to safety like faults in encryption.
  • This also monitors sshd logins, logins of SSH, as well as other system security resources daemon-logged failures.

So, it's the right answer.

3 0
2 years ago
Three different filters are incorporated into the detector packet of the optically stimulated luminescence (OSL) dosimeter. Thes
TEA [102]

Answer: Aluminum, tin, and copper

Explanation: Optically stimulated luminescence (OSL)  is a method in which the ionizing radiation help in measuring of the doses. It has working dependent on the radioactivities which are present in the sediments.

The filters that are used for detection of the OSL is usually made of aluminium , copper or tin because the can easily detect isotopes in the sediments which is cause by minerals like uranium etc.

7 0
3 years ago
A _____ virus uses the language of an application that records a sequence of keystrokes and instructions in an application, such
docker41 [41]

Answer: macro virus

Explanation:

The virus that uses virus uses the language of an application which is vital in recording the sequence of the keystrokes and the instructions in an application, like spreadsheet or the word processing in order to hide virus code is the macro virus.

A macro virus is simply a computer virus which is written in same macro language that is being used for software programs. When a software application is being infected by the macro virus, it leads to a sequence of actions which automatically start when the application is being opened.

6 0
2 years ago
Other questions:
  • Which two fields in an Ethernet frame help synchronize device communica- tions but are not counted toward the frame’s size?
    11·1 answer
  • Choose two browsers and compare their security features.
    5·1 answer
  • Technology has proliferated in Kenya and Somaliland, with text messages used to replace cash, creating mobile money use that, on
    11·1 answer
  • What was the first 1.0.1 version of openssl that was not vulnerable to heartbleed?
    5·2 answers
  • Suppose you have a class called Child with an instance data value called weight and height. Then it has a method called doubleWe
    5·1 answer
  • In the table below, identify the data type that would be most suitable for the second field.
    10·2 answers
  • Write a SQL query to display films in inventory that have never been rented for all stores. Include inventory ID, film ID, film
    13·1 answer
  • _____ oversee the work of various types of computer professionals and must be able to communicate with people in technical and n
    5·1 answer
  • Irene establishes a wireless connection between her laptop and smartphone for sharing files. She has created a LANWANPAN, which
    6·1 answer
  • true or false? in a known-plaintext attack (kpa), the cryptanalyst hs access only to a segment of encrpted data and has no choic
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!