1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Debora [2.8K]
2 years ago
7

You are now going to prepare some reports for the company. Measurements are in metres and volume

Computers and Technology
1 answer:
romanna [79]2 years ago
4 0

if you follow me and like and mark in brainliest answer only I will tell the answer

You might be interested in
The email_list function receives a dictionary, which contains domain names as keys, and a list of users as values. Fill in the b
zysi [14]

Answer:

Following are the solution to this question:

Please find the attachment of this code.

Explanation:

In this code, an email_list method is declared, that accepts a domains parameter, and in the next step, an empty list and two for loop are defined, in which the first for loop is used for a count parameter value and in the second loop is use the append method to add the given value, and use the return method to print its value, and use the print method to call the "email_list" method.  

3 0
3 years ago
opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and use
Alekssandra [29.7K]

Answer:

The operating system must by the use of policies define access to and the use of all computer resources.

Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.

Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:

  1. General Policies
  2. Server Policies
  3. VPN Policies
  4. Back-Up Policies
  5. Firewall Access and Configuration Policies

Cheers!

5 0
3 years ago
If an employee who needs eye protection wears prescription lenses he or she should
gogolik [260]
Wear Regular glasses not contacts.
5 0
3 years ago
Which option ensures that a page break is automatically inserted ahead of a specific paragraph or heading?
gulaghasi [49]

The correct answer is option D, the last one! <3

6 0
3 years ago
Read 2 more answers
Approximately what percentage of the world population owns a smartphone?
Usimov [2.4K]
The number of smartphone users is forcast to grow from 2.1 billion in 2016 to around 2.5 billion in 2019, with smartphone penetration rates increasing as well.over 36% of the worlds population is projected to use a smartphone by 2018, thats up from about 10% in 2011
5 0
3 years ago
Other questions:
  • Climate is considered a(n) _______ limiting factor. (2 points)
    9·1 answer
  • A user reports his or her computer is slow to boot. You check the boot order and determine that the computer is checking the C d
    12·1 answer
  • A certain database has numerous tables, but they do not share any fields in common. this database will not be as powerful as oth
    15·2 answers
  • Explain the history of computing of mechanical era
    14·2 answers
  • Which behavior of the application should the user expect? A user profile has login hour restrictions set to Monday through Frida
    12·1 answer
  • A program called a ( n ) ____ translates instructions written in high-level languages into machine code.
    13·1 answer
  • Suppose a host has a 1-MB file that is to be sent to another host. The file takes 1 second of CPU time to compress 50%, or 2 sec
    12·1 answer
  • Type the correct answer in each box. Spell all words correctly.
    14·2 answers
  • What are some best practices for file management
    8·1 answer
  • A line graph is a great tool for showing changes over time. Why is a line graph better than other graphs at showing this type of
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!