1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gladu [14]
3 years ago
13

Back wit another one, help !?these are two different questions btw

Computers and Technology
1 answer:
trapecia [35]3 years ago
7 0
Question 1: Best way is option 1, Worst way is option 4.

Question 2: Best way is option 4, Worst way is option 3

You might be interested in
Computers heat resistant materials breathing systems for fire fighters food-growing technologies improvements in all of the item
Scorpion4ik [409]
<span>Computers heat resistant materials breathing systems for fire fighters food-growing technologies improvements in all of the items in this list were first made possible by :  a.space exploration.</span>
4 0
3 years ago
Write a program that utilizes the concept of conditional execution, takes a string as input, and: prints the sentence "Yes - Spa
rodikova [14]

Answer:

<em>Written in Python</em>

inputt = input()

if inputt == "SPATHIPHYLLUM":

     print("Yes - Spathiphyllum is the best plant ever!")

elif inputt == "spathiphyllum":

     print("No, I want a big Spathiphyllum!")

else:

     print("Spathiphyllum! Not"+ inputt+"!")

Explanation:

This line gets user input

inputt = input()

This line checks if input is uppercase SPATHIPHYLLUM and executes the corresponding print statement, if true

if inputt == "SPATHIPHYLLUM":

     print("Yes - Spathiphyllum is the best plant ever!")

This line checks if input is uppercase spathiphyllum and executes the corresponding print statement, if true

elif inputt == "spathiphyllum":

     print("No, I want a big Spathiphyllum!")

If user input is not upper or lower case of Spathiphyllum, the following if condition is considered

else:

     print("Spathiphyllum! Not"+ inputt+"!")

4 0
4 years ago
If you have a list of words that you wish to make into a bulleted list, you must first highlight or ________ the words with your
motikmotik
<h3>Answer:</h3>

C. select

<h3>Explanation:</h3>

A. if you delete the words you can make them into a bulleted list

B. if you remove them you can make them into a bulleted list neither

D. Copying the words doesn't need for that

Hope it helped you

3 0
4 years ago
Scenario2: Now suppose the LAN must support both voice and data and you must choose one of these multiple access strategies in o
AleksandrR [38]

Answer:

The RTP (real time protocol) which uses the UDP ( user datagram protocol) and Real-time control protocol.

Explanation:

The RTP of a voice over IP protocol (VoIP) which is used to prioritise the transfer of video and audio data over text data. It is used for video conferencing and telephony services in an enterprise.

It uses the user-datagram protocol to transfer or access videos and audio data for its real time effect and the real-time control protocol for quality of service analysis and maintenance.

4 0
3 years ago
What type of element addresses the recovery of critical information technology (it) assets, including systems, applications, dat
TiliK225 [7]

Disaster recovery type of element addresses the recovery of critical information technology (it) assets, including systems, applications, databases, storage and network assets.

<h3>What is disaster recovery plan in information technology?</h3>

A disaster recovery plan (DRP) is a formal document produced by an organization that contains explicit instructions on how to respond to unplanned happenings such as natural disasters, power outages, cyber-attacks and any other disruptive events.

<h3>What is a disaster recovery plan and why is it important to the organization?</h3>

A disaster recovery plan describes procedures for resuming work quickly and reducing interruptions in the aftermath of a disaster. It is an important part of the business continuity plan and it allows for sufficient IT recovery and the precluding of data loss.

To learn more about Disaster recovery, refer

brainly.com/question/24131287

#SPJ4

8 0
2 years ago
Other questions:
  • Gunther is filling in his own input mask. He wants to format the Social Security numbers of his clients. The field must contain
    7·1 answer
  • _____ are skilled computer users who try to gain unauthorized access to other people’s computers.
    15·1 answer
  • What general strategies can the network managers use to reduce congestions?
    7·1 answer
  • E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.a) trueb) fa
    8·1 answer
  • A manger wants to hire a new technician for the desk that typically assists clients with simple computer problems over the phone
    9·1 answer
  • I think my knee....
    14·1 answer
  • Which two components are configured via software in order for a PC to participate in a network environment
    5·1 answer
  • The purpose of a flowchart is similar to the purpose of pseudocode.<br> True<br> False
    5·2 answers
  • WILL GIVE BRAINLIEST!!! PLEASE HELP!!!
    5·1 answer
  • When creating an html document, what do we use to set aside space for content?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!