1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksklad [387]
2 years ago
12

The

Computers and Technology
2 answers:
saveliy_v [14]2 years ago
4 0
The answer is Undo I think
NARA [144]2 years ago
3 0
Undo I think to a good
You might be interested in
Joel has left his computer unattended while answering a phone call . A TV repairer in his house tries to surf through the applic
Triss [41]
<span>Joel is a victim of a security breech. By leaving his computer unattended and not locked, he allowed for another person to use his credentials to access (or attempt) to access information that would otherwise be restricted to him. The fact that the unauthorized person did not find the information he was seeking does not minimize the risk.</span>
5 0
3 years ago
Which of the following is NOT a cost typically associated with owning a car?
Arturiano [62]
A. fuel ; when you but a car you aren't buying the gas to go in it 
3 0
3 years ago
How does speech recognition software know what you are saying?
boyakko [2]
It converts the mic input into a string of raw data, then compares it to hundreds, even thousands of voice samples. The output is a polished string of data in words.
8 0
3 years ago
Int someFct (int N)[
Allisa [31]

Answer:

solution attached.

Explanation:

Also, the tetha time complexity of T_upper would be 2^{\frac{n}{3} }

3 0
3 years ago
What characters are in Tekken 3
MrMuchimi

Answer:Tekken 3 features a largely new cast of characters, including the debut of several now-staple characters such as Jin Kazama, Ling Xiaoyu, Bryan Fury, Eddy Gordo and Hwoarang, with a total of twenty-three characters.

Explanation: I feel like the answer is pretty strait forward.

6 0
3 years ago
Other questions:
  • Suppose you have a file of data of approximately 100,000 personnel records (FYI, 213 = 8192 and 214 = 16384) using Social Securi
    12·1 answer
  • Play among us with me
    12·2 answers
  • What does "ttyt" stand for?
    13·2 answers
  • Which of the following is not hardware? Question 7 options: A) Wireless network router B) Printer C) Virus Scanner D) Flat-panel
    11·1 answer
  • What does 32mb SVGA do
    15·1 answer
  • What is star topology
    15·2 answers
  • Write a calculator program that will allow only addition, subtraction, multiplication &amp; division. Have the
    7·1 answer
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
  • Sub to the channel plz plz
    6·2 answers
  • Primary memory consists of the various devices that are able to store data and programs even when the power is off. true or fals
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!