1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aneli [31]
3 years ago
9

Haya would like to complemely delete Slide 11 from her presentation so that slides 12–16 become slides 11-15. What is

Computers and Technology
1 answer:
MArishka [77]3 years ago
6 0

Answer:

replace everything on 11 to 12

Explanation:

You might be interested in
Convert 12 bits to bytes​
Genrish500 [490]

Answer:

1.5 bytes

Explanation:

I byte = 8 bit ....

3 0
2 years ago
The collection of programs on a computer is referred to as _______________.​
schepotkina [342]
It is referred to as software

Software consists of an entire set of programs and routines linked with the operation of a computer. In other words, it is a collection of executable instructions that enable you to interact with a computer and its hardware. A computer would be rendered useless without software.

 






5 0
4 years ago
For this lab, you will work on a simple GUI application. The starting point for your work consists of four files (TextCollage, D
Bad White [126]

The answer & explanation for this question is given in the attachment below.

Download docx
4 0
3 years ago
Jason needs to renew the certificate for his company’s web server. Which of the following is recommended to be submitted to the
notsponge [240]

Answer:

A. CSR

Explanation:

CSR, (certificate signing request also known as certification request, CR) are messages sent by an applicant to a certificate authority to acquire a digital identification certificate or renew an already existing one. It contains information of the client or applicant like domain name, public key etc.

Keyescrow, CRLD and OCSP are not recommended or required for renewing digital certificate as they commands or settings for shortcuts and commands.

3 0
4 years ago
If a destructive program is running that might be destroying evidence what should be done
Vikentia [17]
The choices can be found elsewhere and as follows:
a. perform an immediate full backup
b. attempt to end the process
c. pull the power cable
d. record the destruction using a video capture of the screen

I think the correct answer is option a. If a destructive program is running that might be destroying evidence, then perform an immediate full backup. 
3 0
3 years ago
Other questions:
  • How does soil lose its value? A.When the top soil is stripped by wind or water B.When the bedrock is damaged by animals C.When w
    15·1 answer
  • What can be designed to create annoying glitches or destoey data?...
    13·2 answers
  • To display a pop-up form for a control, such as account number in a datasheet create a user interface (UI) macro that is associa
    12·1 answer
  • What symbol is used for an assignment statement in a flowchart?
    8·1 answer
  • Which action is applicable only to tables?
    13·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    7·2 answers
  • How many different textile items would you find at a festival? (please list 5 items)
    7·1 answer
  • A trial-and-error method of problem solving used when an algorithmic or mathematical approach is called
    7·1 answer
  • which dual-stack architecture allows ipv4 and ipv6 at the network layer to access a single tcp/udp stack
    8·1 answer
  • Why AI strategy is important?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!