1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Charra [1.4K]
2 years ago
9

3. Radheshree has to complete her assignment and submit it on the next day. While typing

Computers and Technology
1 answer:
Dafna1 [17]2 years ago
5 0

Answer:

she can use the onscreen keyboard

this application is present in accessories file in the windows

You might be interested in
Distributed computing is a term that describes the work that autonomous computers can do to achieve a common goal, especially in
Bond [772]

Answer:

To find the solution of Global warming, to find the combination of some drugs and test them, etc.

Explanation:

Distributed computing can be described as when a number of computers connected on the network communicate with each other by passing messages, and these systems are known as distributed systems.

There are various goals that can be accomplished using distributed computing, one of them is to find the solution of Global warming, by coordinating with different areas.  

Another one is to find the combination of some drugs and test them to make new medicine.

7 0
3 years ago
TRUE/FALSE QUESTIONS: T F 1. An intruder can also be referred to as a hacker or cracker. T F 2. Activists are either individuals
Law Incorporation [45]

Answer:

1. True 2. False 3. True 4. True 5. True 6. False 7. True

Explanation:

1.  A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.

2. Activists are people who campaign to bring about a positive political or social change.

3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.

4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.

5. Yes, intruders have a common attack methodology.

6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.

7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.

5 0
3 years ago
Which type of image is composed of lines, curves, and fills?
Nataliya [291]
<h2>Answer: Vectors</h2>

Explanation:

4 0
3 years ago
What is a many-to many types of correspondence?
Ann [662]

Answer:

We have many types of correspondences. There are internal correspondences, external correspondences, sales correspondences, and personalized correspondences. By many to many correspondences we mean, a lot of people correspond with a lot many people from another department, company or market, or any set of people in fact. An internal correspondences, sales correspondences, personalized correspondences or external correspondences can be of many to many types, and as well as of others like one to one, many to one and so on.

Explanation:

Please check the answer.

5 0
3 years ago
What is the important safety information found on a boat's capacity plate?
tigry1 [53]
Written on the boat capacity plate that is important for every captain or owner must be knowledgeable about is the maximum allowable total weight and number of passengers. This is to avoid untoward accident due to over capacity and a ticket for unsafe operation by law enforcements. 
6 0
3 years ago
Other questions:
  • PLEASE help me RIGHT NOW!!!!!!!!! I will give a Brainly to anyone who helps me!
    15·1 answer
  • I can't find the errors! Could anyone help me please?!
    5·1 answer
  • You’ve just finished training an ensemble tree method for spam classification, and it is getting abnormally bad performance on y
    9·1 answer
  • Do u have to divide or multiply this problem 5300 yd = mi
    9·1 answer
  • Can anyone please help me out
    10·1 answer
  • Question 1 (1 point)
    9·1 answer
  • (--BRAINLIEST--)<br>Explain the types of secondary memory on the basis of data access.​
    8·2 answers
  • What safety do you need to have ready to start a device repair?
    6·1 answer
  • When a ____________ file is opened, it appears full-screen, in slideshow mode, rather than in edit mode.
    6·1 answer
  • In Python write a program that reads a list of integers into a list as long as the integers are greater than zero, then outputs
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!