1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Roman55 [17]
3 years ago
9

20 points for ez question lol

Computers and Technology
2 answers:
V125BC [204]3 years ago
7 0

Answer:

Its A, B, D, F

Explanation:

Smart

slega [8]3 years ago
5 0
I think it might be the third on not certain
You might be interested in
Many programmers today use a(n) _________, which is software that helps them build their computer programs. eula cad sdlc ide
kipiarov [429]
The answer is Integrated Development Environment (IDE). Many programmers today use Integrated Development Environment (IDE) which is a software that helps them build their computer programs. It gives complete facilities to computer programmers for software development.  
8 0
3 years ago
You have repaired a broken LCD panel in a laptop computer. However, when you disabled the laptop, you bent the hinge on the lid
Alex787 [66]
Yes it would take a second or todo
8 0
3 years ago
A file with a com extension is most likely to be a(n) ___ file.
olasank [31]
I think that the answer is: A executable
4 0
3 years ago
Read 2 more answers
What option is available on a Host A record to tell the system how long the record should remain in the database after it was cr
lapo4ka [179]

Answer:

Time to live.    

Explanation:

The Time to Live is used for the purpose of the expiration table in the rows dynamically.The Time to live is represented in the time limit to stay in the database the Time to live It is no longer possible to fetch the data that has passed its closing timeout value also it is not displayed in the store metrics.

The Time to live is available on the host in the log informing the system how long the record will stay in the database after it has been generated or last modified.

8 0
3 years ago
Cyber security includes which of the following?
Law Incorporation [45]

Answer:

d. All of above

Explanation:

All answers are correct!

5 0
4 years ago
Other questions:
  • What is the purpose of lookup tables in spreadsheet software
    13·2 answers
  • A company has developed a business-critical system for its core automation process with a software vendor. Which of the followin
    12·1 answer
  • 2-Write test programs in java to determine the scope of a variable declared in a for statement. Specifically, the code must dete
    7·1 answer
  • which software is used to mimic intricate hand drawings into digital paintings? _____ is used to replicate hand drawings into di
    7·1 answer
  • With ______________, the cloud provider manages the hardware including servers, storage, and networking components. The organiza
    6·1 answer
  • A keyboard is a/an _____. interconnector port packet NAS
    7·1 answer
  • The 7-bit ASCII code for the character ‘&’ is: 0100110 An odd parity check bit is now added to this code so 8 bits are trans
    12·1 answer
  • According to which virtue do you need to secure information by limiting computer access to authorized personnel only?
    6·1 answer
  • Power delivered to the hitch of tractors is called
    12·1 answer
  • What tells the hardware what to do and how to do it?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!