1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivan
3 years ago
6

Short note about micro miniaturzation​

Computers and Technology
2 answers:
Ghella [55]3 years ago
3 0

Answer:

the manufacture of extremely small versions of electronic devices.

lord [1]3 years ago
3 0

Explanation:

asks

mxskssssksskwlwslskamzmzmsmsmz

You might be interested in
Which of the following software programs provides for e-mail communication?. A. Access. B. Word Perfect. C. Outlook. D. Excel
torisob [31]

There are several software programs and internet applications that you use to send electronic mail (e-mail) to other people. However, for programs that are part of the Microsoft Suite, only one provides this ability, which is (C) Outlook.  

Microsoft Access is used to manage databases, while Microsoft Excel is used to analyze numerical and text data. WordPerfect is a word processor software created by Corel.  


5 0
3 years ago
Read 2 more answers
9. The voltage of a replacement capacitor must
nasty-shy [4]

Answer:

B

Explanation:

It is the capacity (in Farad) of the capacitor that determines its behaviour in the circiut. The voltage is merely a qualification of what it can handle. Higher is "better".

6 0
3 years ago
What command in cisco IOS allows the user to see the routing table
maksim [4K]

Answer:

Show IP route command

Explanation:

7 0
3 years ago
[30 points, will mark Brainliest] Which of the following is the lowest hexadecimal value? Explain why. Options to chose; F2, 81,
larisa86 [58]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

First, we need to convert these hexadecimal numbers into decimal numbers, then we can easily identify which one is the lowest hexadecimal.

The hexadecimal numbers are F2, 81, 3C, and 39.

F2 = (F2)₁₆ = (15 × 16¹) + (2 × 16⁰) = (242)₁₀

81 = (81)₁₆ = (8 × 16¹) + (1 × 16⁰) = (129)₁₀

3C = (3C)₁₆ = (3 × 16¹) + (12 × 16⁰) = (60)₁₀

39 = (39)₁₆ = (3 × 16¹) + (9 × 16⁰) = (57)₁₀

The 39 is the lowest hexadecimal number among the given numbers.

Because 39 hex is equal to 57 decimal.

39 = (39)₁₆ = (3 × 16¹) + (9 × 16⁰) = (57)₁₀

5 0
3 years ago
3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
ELEN [110]

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

7 0
3 years ago
Other questions:
  • What is the output of the following program?
    8·1 answer
  • Given a int variable named yesCount and another int variable named noCount and a char variable named response, write the necessa
    9·1 answer
  • You can execute three main types of linux commands. what are they?
    8·1 answer
  • Ben pays his mobile bills, watches movies, and shops online using the Internet. Which internet activity does he perform?
    13·2 answers
  • Is there a way to earn free robux
    7·2 answers
  • Do you have to make a account of Windows 10?
    12·1 answer
  • 2. The Internet could best be described as: *
    12·1 answer
  • The response from a Google Form can be seen in how many ways?
    10·1 answer
  • Pick one of the following scenarios and
    6·1 answer
  • Please please help I don’t understand this
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!