1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pshichka [43]
2 years ago
11

You are interested in buying a laptop computer. Your list of considerations include the computer's speed in processing data, its

weight, screen size and price. You consider a number of different models, and narrow your list based on its speed and monitor screen size, then finally select a model to buy based on its weight and price. In this decision, speed and monitor screen size are examples of:_______.
a. order winners.
b. the voice of the supplier.
c. the voice of the customer.
d. order qualifiers.
Computers and Technology
1 answer:
Nimfa-mama [501]2 years ago
6 0
The answer would be B.
You might be interested in
Most people entering the construction industry learn a specific craft through:
LuckyWell [14K]
Most people entering the construction industry learn a specific craft through: An apprenticeship program
7 0
3 years ago
Read 2 more answers
Which design element is used to convey smoothness or roughness in a design
iris [78.8K]

Keyboard would be the correct answer

5 0
3 years ago
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY <3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
3 years ago
For the description below, develop an E-R diagram:
xeze [42]

Answer:

See explaination

Explanation:

E-R diagram:

Entity Relationship Diagram, also known as ERD, ER Diagram or ER model, is a type of structural diagram for use in database design. An ERD contains different symbols and connectors that visualize two important information: The major entities within the system scope, and the inter-relationships among these entities.

Please kindly check attachment for for the ERD of the question asked.

4 0
3 years ago
Give me 5 examples of Cyber Security
Vera_Pavlovna [14]

Answer:

Firewalls, Antiviruses, Malware, Antispyware,

Explanation:

8 0
3 years ago
Other questions:
  • >
    6·1 answer
  • Variable costs are __________.<br><br> A. decreasing<br> B. increasing<br> C. static
    10·1 answer
  • What steps should Jeremy take to get himself motivated to study for the test?
    12·2 answers
  • How do i show all emails from same sender in outlook
    13·2 answers
  • CPU BENCHMARKS are measurements used to compare performance between processors
    9·1 answer
  • Can someone help me with this code please explain it to me in simple way
    15·1 answer
  • How to clear a function in functional component react.
    6·1 answer
  • Question 1
    5·1 answer
  • PLEASE HELP ME
    11·1 answer
  • What is malware? What are some signs that malware may be impacting the performance of your computer? How can you avoid malware?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!