1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
matrenka [14]
3 years ago
8

Which of the following is NOT true about a flow chart?

Computers and Technology
1 answer:
SCORPION-xisa [38]3 years ago
4 0
I think the answer is A
You might be interested in
An end-user device requires a specific IP address every time it connects to the corporate network. However, corporate policy doe
sesenic [268]

Answer:

DHCP reservation  is the correct answer.

Explanation:

It is the Internet Protocol assignment which is not temporary. It is the particular address of the Internet Protocol within a DHCP set, which is not temporarily assigned to a particular DHCP client for lease use.

So, the device of the last user required the address of the Internet Protocol whenever they linked to the company's server. The following reservation provides the permission to use static addresses of the Internet Protocol without affecting the company's server.

6 0
3 years ago
Computer forensics is practiced _____. A. Only by specially trained government and law-enforcement personnel B. By many organiza
laiz [17]

Answer:

Option B is the correct answer.

<h3>Computer forensics is practiced by many organizations, including public- and private-sector organizations such as hospitals, law enforcement, and businesses. </h3><h3 />

Explanation:

Computer forensics can be defined as a branch of digital forensics that deals with the evidences and and proofs found on all digital storage media such as computers.

It is basically a step for enhancing security bases of communication. Therefore it is mainly used by law-enforcement personnel but it can also be practiced by other institutions for the purpose of self security.

<h3>I hope it will help you!</h3>
4 0
3 years ago
Which guideline should you use when downloading software from the internet?
Anton [14]
Limiting your computer's vulnerability to malware is a crucial safe browsing habit. You can protect your computer by running antivirus<span> and </span>antimalware<span> software like </span>Bitdefender<span>, </span>Norton<span>, or </span>Kaspersky<span>. These programs can block malware from being installed and can remove it if it does get onto your computer. Even if you don't see signs of malware on your computer, running regular scans can catch any malware that has escaped notice.</span>
4 0
3 years ago
Read 2 more answers
When you set code inside other code, in an orderly fashion, it is called:
V125BC [204]

Answer:

It is called Nesting

Explanation:

or in this case B

5 0
3 years ago
In MATLAB please.
Leona [35]

Answer:

function [Area,Perimeter,L]=f_circle(x)

 % Area: pi*x^2 area of circle with radius x

 % Perimeter: 2*pi*x perimeter length of circle with radius x

 % x can be a vector

 minargs=1;maxargs=1;narginchk(minargs,maxargs);  % only 1 input accepted

   if ~isequal('double',class(x))                   5 input has to be type double

       disp('input type not double');

       return;

   end

   Area=pi*x.^2;

   Perimeter=2*pi*x;

 end

4 0
3 years ago
Other questions:
  • Ashley wants to know the oldest form of both water purification and waste disposal. Help Ashley determine the methods. The oldes
    14·1 answer
  • Manny has created more than one hundred bookmarks. When he looks at the menu, he has to scroll through a very long list of bookm
    15·1 answer
  • The technology Herman Hollerith created in the 1880s began the modern-day data processing function in computers.
    9·1 answer
  • Instructions:Select the correct answer.
    5·1 answer
  • .____________ is a way to identify and differentiate goods andservices through use of a name or distinctive design element.
    10·1 answer
  • To change the design of a query, right-click the query in the Navigation Pane and then click ____ on the shortcut menu.
    9·1 answer
  • How do you change the color on the text in the email​
    6·1 answer
  • Of the following choices what was the best thing to do with electronic equipment you no longer want
    7·1 answer
  • Compare and contrast traditional and cloud data backup methods. Assignment Requirements You are an experienced employee of the D
    14·1 answer
  • How do I type in bold on brainly?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!