1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vazorg [7]
3 years ago
8

Ano ang humahati ng globo ng equdor

Computers and Technology
1 answer:
Butoxors [25]3 years ago
3 0

Answer:

Maybe if you gave me a question, I could answer it. :D

Explanation:

You might be interested in
g You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do
Sedbober [7]

Answer:

It places the document in a buffer

Explanation:

Since the printer can only print a document at a time, the other document is going to be placed in a buffer.

The print buffer can be described as a location in memory that has the function of holding data that is going to be sent to a computers printer. A print job such as in this scenario may remain in the buffer because another document is to be printed first.

Sometimes a document could be put in the buffer because the computer is waiting for the printer to respond. This is just another reason why documents are placed in a buffer.

5 0
3 years ago
WHAT is an UX designer? an interactive designer ? a front-end developer ? and what they do?
MatroZZZ [7]
Basically, it is an idea that has numerous measurements, and it incorporates a group of various controls, for example, cooperation outline, data construction modeling, visual configuration, convenience, and human-PC connection.

Answer: an interactive designer.


What they do?

It's about improving the experience that individuals have while communicating with your item, and ensuring they find esteem in what you're giving.



3 0
3 years ago
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Nostrana [21]

Answer:

Zero-day exploits

Explanation:

Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.

When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.

5 0
3 years ago
Will creates an entry in his calendar and marks it as an all-day instance. Which item has he created?
Hatshy [7]

Answer:

The answer u looking for is event

5 0
3 years ago
Read 2 more answers
In g.o.o.g.l.e sheet Columns are labeled by ____​
telo118 [61]

Answer:

Explanation:

Click the Data option.

Click on Named Range. This will open the 'Named ranges' pane on the right.

Click on the 'Add a range' option.

Enter the name you want to give the column (“Sales” in this example)

Make sure the column range is correct. ...

Click on Done.

3 0
2 years ago
Other questions:
  • If a cache access requires one clock cycle and dealing with cache misses requires an additional five clock cycles, which of the
    9·1 answer
  • In addition to training on the products and on company policy, it does not make sense to be prepared to speak about your company
    6·2 answers
  • vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa
    14·1 answer
  • Harry is undertaking a digital photography course as the college and wants to
    12·1 answer
  • What are the guided and unguided transmission media and what are the differences?
    15·1 answer
  • High-end tools in project management software have enterprise and _____ functions that summarize and combine individual project
    9·1 answer
  • I need help!!! i will make you a brainliest!!
    10·1 answer
  • 1. How many bits would you need to address a 2M × 32 memory if:
    8·1 answer
  • Areas on which the development of the computer as a communication technology is based
    5·1 answer
  • Importance of folders on a computer <br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!