1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
matrenka [14]
3 years ago
8

Which of the following is NOT true about a flow chart?

Computers and Technology
1 answer:
SCORPION-xisa [38]3 years ago
4 0
I think the answer is A
You might be interested in
The process of starting or restarting a computer or mobile device is called __________.
Neko [114]
Hi!

When ever we start or restart any device we may hold - this process is called <em>booting. </em>

Hopefully, this helps! =)
3 0
3 years ago
1. Which markup language adds the ability to use video without requiring the user to download add-ons?
aniked [119]

HTML5

HTML5 has fewer plug-ins like the ability to standardize how audio and video are presented on a Web page. It introduces the <video> element designed to remove the need to install 3rd party add-ons and plug-ins like adobe flash player. It also adds the <audio> element  too that allows pages to smoothly add audio files.

3 0
3 years ago
Which format must a document be saved in to share it between two different word processors?. Select one of the options below as
slava [35]
When two different word processors are used to share a document, the word document must be saved in the compatibility format where some of the aspects of one version is retained and reflected in the other version while others cannot be retrieved due to the alteration or absence of a component. 

6 0
3 years ago
In DNS cache poisoning, valid packets exploit poorly configured DNS servers to inject false information to corrupt the servers'
myrzilka [38]

Answer: True

Explanation: Domain name system(DNS) is the kind of attack that exploits the functioning of the DNS .This process is also known as the DNS spoofing .The corrupted data is invoked in the cache database and thus creates spoof.

It creates diversion of the traffic from the actual servers to the fake servers and entering the exploited data in the cache database.Thus, the given statement is true.

4 0
3 years ago
MSS are best designed todeal with systems whose goals are not well defined.<br> True<br> False
Zolol [24]

Answer: True

Explanation:

 Yes, it is true that MSS are best design to deal with systems whose goals are not well defined. As, information and data concepts are easily defined by the MSS and also it is easily update the system also. It is used to simulation the data that are designed to match real experiment. It includes the decision to action with the measurement to action interface system.

 

4 0
3 years ago
Other questions:
  • _____ refer(s) to computer programs that provide instructions for a computer to execute a desired task. Answer .a.Software .b. I
    7·1 answer
  • One reason for using social media is to develop social and professional contacts. True or false?
    9·2 answers
  • Your friend sends you a photograph of his son. you want to enlarge the photograph. which program type will you use to make this
    15·1 answer
  • Explain why living things store energy in lipids instead of in carbohydrates
    5·1 answer
  • A security policy is a
    11·1 answer
  • Which option should you select to accept a tracked change? A. Accept B. Reject C. Review D. Delete
    8·2 answers
  • Cine stie repede va rog mult si repede
    9·1 answer
  • Atheel tests a program and gets a NameError. How can this be fixed?
    13·2 answers
  • Role of User Defined Iprms for creation of paten
    8·1 answer
  • Which of the following actions taken by the Fed will increase the nation’s money supply? (Select all that apply.)
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!