1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga2289 [7]
3 years ago
9

Como se llama este icono de word

Computers and Technology
1 answer:
GarryVolchara [31]3 years ago
4 0
Is that blocks? i cant even tell what it is
You might be interested in
When you navigate inside a compressed folder, you click the
muminat
B. Extract all files

In order to access a zipped (compressed) folder you have to extract them. The prompt should say “Extract” not Unzip.
7 0
3 years ago
explain why the intangibility of software systems poses special problems for software project management.
Vaselesa [24]
Unlike other projects like hardware, mechanical works which is tangible it is very easy to identify the progress of the product. But since the product here is software, it is very hard to determine at what phase or progress you are on now. Thus it needs a documentation from someone who are very knowledgeable to be able to know your progress,
4 0
3 years ago
What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?
Sati [7]

Question with options:

What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?

-private

-web server

-public web

-web client

Answer:

Web server digital certificate such as SSL(Secure Sockets Layer) Certificate

Explanation:

Digital certificates are certificates issued by trusted authorities (called Certificate Authority such as Encrypt Certificate Authority) and allow users determine the originality of a resource. With these certificates, users can confirm who the issuer of the certificate is and to whom the certificates are issued. They give users more confidence when using the web.

To determine the authenticity of a web server to a client, a web server digital certificate such as SSL certificate is used.

8 0
3 years ago
A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
OleMash [197]

Answer: EMI(Electromagnetic interference)

               RFI(Radio frequency interference)

Explanation: Electromagnetic interference is the emission of the electromagnetic signal that can disturb the working of the other device.It invokes the disturbance that can create error, under-performance mechanism,distortion etc in the equipment.

Radio-frequency interference(RFI) is the radio-frequency signal that interferes the other device by creating noise and distortion. This leads to breaking of the operation and data error.

Other options are incorrect because cross talk is referred as undesired communication between signal ,attenuation is the degradation in the  amplitude of any signal and extended length of cabling is increasing the length of the cable.Thus the correct answer is RFI and EMI.

4 0
4 years ago
What are the Predictive tasks in Data Mining?
hodyreva [135]

Answer:

The process of sifting through the system databases and finding the relevant data to analyze is known as data mining. In predictive data mining, the process uses algorithm-based tools to go through the database and to look at the transactions to support the prediction of future volumes of the transactions. It is the task of the analytics team. It is often used with, predictive analytics. The predictive analytics is the use of data to forecast the results

6 0
4 years ago
Other questions:
  • Required
    12·1 answer
  • You can change the color of the value of a cell or the background
    14·2 answers
  • Charts are inserted into an excel spreadsheet using the commands in the charts group on the ____ tab on the ribbon.
    13·1 answer
  • What car Is this because I want it for my daughters sweet 16th birthday
    13·1 answer
  • What is the most secure method for controlling privileged access to a system available for use in a public area?a. Database view
    5·1 answer
  • 5. How would you describe the relationship between blocks of code and commands?​
    14·2 answers
  • Where are some places that cyberbullying occurs? Check all that apply.
    15·1 answer
  • POINT AND BRAINLIEIST GIVE AWAY!!!
    11·2 answers
  • Create the arrays and assign randomized values for each element in the array. The randomized values should range from 1 to twice
    9·1 answer
  • Consider a computer that uses 5 bits to represent positive integers and uses all 5 bits to represent the value.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!