1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wel
3 years ago
11

Can somebody help me with this plzzz, I watched the video but I don’t got it :’(

Computers and Technology
2 answers:
Iteru [2.4K]3 years ago
5 0
The answer is n. Hope this helps
krek1111 [17]3 years ago
4 0

Answer:

n,

Explanation:

You might be interested in
Who could vote in the first democracy?
zmey [24]
B citizens

in the 4th century there were about 100k citizens. only about 40k could participate in the democratic process ( this is only if the question is referring to ancient democracy )
4 0
3 years ago
Heather is troubleshooting a computer at her worksite. She has interviewed the computer’s user and is currently trying to reprod
Aleksandr [31]

Answer:

D. Identify the problem.

Explanation:

There are six steps or stages in computer system troubleshooting. They are,

1. Identify the problem: In the stage of troubleshooting, the user is interviewed to get a description of the problem. Reproducing the problem is essential to confirm the described problem of the system before moving to the next stage.

2. Establish a theory of probable cause: when the problem is identified, a list of the possible cause of the problem is made.

3. Test the theory to determine a cause: each items on the list of possible cause of the problem is tested to confirm its actual cause.

4. Resolve the problem.

5. Verify full system functionality

6. Document the findings, actions and outcomes.

8 0
4 years ago
The five major functional areas consist of the Command Staff as a whole and the four sections in the General Staff: Operations,
inn [45]

The five major functional areas consist of the Command Staff as a whole and the four sections in the General Staff: Operations, Planning, Logistics, and Finance and Administration. Of these, the planning section consists of resource unit, situation unit, demobilization unit, and the documentation unit.

<u>Explanation:</u>

The Resource unit looks after the allocation, analysis, and organization of resources.

The situation unit collects information about The status of a particular incident that takes place in an organization.

The Demobilization unit is responsible for preparing a demobilization plan. It is responsible for the safety of persons and machines in case of any incident.

The Documentation unit looks after all the documents and prepares them on time.

8 0
3 years ago
I just want to say thanlouy for all the branlies on this app
Gnom [1K]

Answer:

that's just what we do :D

Explanation: because we're awesome UvU

7 0
3 years ago
What is a type of machine-to-human communication?
Sonbull [250]

A. Biofeedback

Its where your body is read by a machine and you read the machine

3 0
4 years ago
Read 2 more answers
Other questions:
  • _________ is the biggest problem you can face if you don’t identify the scope of your risk management project. Scope creep Nonco
    10·1 answer
  • Need help with just #8
    12·1 answer
  • You are part of a team that is setting up a movie streaming service. The company is planning on initially making available 500 m
    8·1 answer
  • Why do businesses often provide a logo on their web pages?
    13·1 answer
  • For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and also pro
    6·1 answer
  • Alice and Bob decide to communicate using NTRUEncrypt with parameters (N, p, q) = (7, 3, 29). Alice’s public key is h(x) = 3 + 1
    15·1 answer
  • 4. Write technical term for the following statements
    15·2 answers
  • Does anybody know how to get this little search bar thing off of my task bar on a HP laptop.
    12·1 answer
  • The __________ statement allows you to check for
    7·1 answer
  • What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!