1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anuta_ua [19.1K]
2 years ago
13

HELP!!!

Computers and Technology
2 answers:
jeyben [28]2 years ago
6 0

Answer:

A. a tool tip

Explanation:

Viktor [21]2 years ago
5 0
Letter A tool flip because it makes sense
You might be interested in
#5 Multiple Select Which of the following describes a hardware error? Select 3 options.
DENIUS [597]

Answer:

A, E

Explanation:

Hope this is correct

7 0
2 years ago
Read 2 more answers
Let’s say you attach four images to accompany an important tweet that you’ve composed in the Hootsuite Compose Box. On Twitter,
Damm [24]
I doub between:

<span>  C)  A series of 4 full size, but individual tweets (with the tweet copy appearing above the first image of the series)  D)  A collage format, with full size images</span>

6 0
3 years ago
Gustavo is completing his homework online. When he uses a computer, what converts the information he inputs into instructions th
Otrada [13]
I can not understand your question, about it. What is homework of Gustavo working in, Visual or Dev C++ with any language?
4 0
2 years ago
Read 2 more answers
What process does a system use to officially permit access to a file or a program CIS 502 ?
ipn [44]

Answer:

Authorization                                

Explanation:

Authorization is a security process to determine access levels related to system resources such as files, services, computer programs, data and application features. This is the method of allowing or denying access to a resource which enables the user to get access to various services and resources depending on the user's identity.

Authorization is the process that checks if a user has the permission to get access to a particular file or perform a particular action, ensuring that user has successfully authenticated himself. It refers to defining access policy.

For example a system administrator determines for the system device, in multi-user computer systems, which users are granted access to system and its resources and privileges are granted.

4 0
2 years ago
Which of the following definitions describes a circuit breaker ground fault circuit interrupter (GFCI)?
LenKa [72]
<span>A ground fault circuit interrupter (GFCI) is a device that closes off an electric power circuit when it notices that current is curving alongside an unintentional path, such as over water or an individual. Circuit breaker GFCIs are frequently used as substitutes for standard circuit breakers and offer GFCI guard to all holders on that discrete circuit. So therefore, the answer is B.</span>
7 0
2 years ago
Other questions:
  • Landon starts his computer and receives the error message, "Hard drive is not found." In a panic, he calls you because he did no
    14·2 answers
  • Lionbridge theory test
    6·2 answers
  • How do you determine latitude using an astrolabe?
    11·1 answer
  • Andrea needs to format the legend on her chart. She clicks on the chart to select it. Which of the
    13·1 answer
  • a user reports that his dot matrix printer is printing dark and clear on the left of the paper but that the print is very light
    6·1 answer
  • The first and second numbers in the Fibonacci sequence are both 1. After that, each subsequent number is the sum of the two prec
    6·1 answer
  • Write a programmer defined function that compares the ASCII sum of two strings. To compute the ASCII sum, you need to compute th
    6·1 answer
  • What do you hope will be in/added GTA 6?
    13·1 answer
  • What are the four steps for planning a table?​
    10·1 answer
  • MP3 BrainPoP Quiz
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!