1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ladessa [460]
2 years ago
8

How do I make someone "Brainiest". First person to reply will get "Brainiest"

Computers and Technology
2 answers:
xxTIMURxx [149]2 years ago
6 0

Answer:

Usually when someone answers a question there would be an option to mark the brainliest. However, you only get one every like 24 hrs so if you already gave someone brainliest you can't give it to someone else for a while

Explanation:

nevsk [136]2 years ago
3 0

Answer:

Brainiest

Explanation:

You might be interested in
A(n) ____________________ key is a key that is not reused, but rather is only used once, thus improving security by reducing the
taurus [48]

Answer:

Computer Security

Explanation:

if referring to only to a computer, then it can be considered secure when the computer does what is is supposed to do and only what it is supposed to do, but in more modern times the definition has shifted from the computer to the information being processed

3 0
2 years ago
Which type of cloud computing offers easily accessible software and applications on the machines?
blsea [12.9K]

Answer

Software as a service

Explanation

Software as a service (SAAS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet. SAAS is one of three main categories of cloud computing.

Cloud computing is the use of internet  to access hardware and software service instead of keeping regular physical hardware and software in the office space. Basically it is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

6 0
2 years ago
Which business filing process puts documents or data in the order by date? a. Linear
ivanzaharov [21]

Answer:

d. Chronological

Explanation:

Chronological can be defined as an arrangement of data, items or documents in the order in which they occurred or happened (in time), from the earliest to the most recent or latest.

Hence, chronological order is a business filing process which puts documents or data in the order by date.

<em>For instance, the arrangement of documents in a shelf from January to December. </em>

3 0
3 years ago
Write a script named numberlines.py. This script creates a program listing from a source program. This script should: Prompt the
ddd [48]

Answer:

See explaination for program code.

Explanation:

inputFileName = input("Input filename: ") outputFileName = input("Output filename: ") inputFile = open(inputFileName, "r") outputFile = open(outputFileName, "w") count = 1 for line in inputFile: newLine = str(count).rjust(4, " ") + "> " + line outputFile.write(newLine) print(newLine) count += 1

4 0
3 years ago
Elsa wants to save her work at the office to be continued at home either on a pen drive or CD. Outline three reasons why she wil
Rzqust [24]

Answer:

More space

Pen drives generally have more storage capacity than CDs with CDs usually having just around 700 Megabytes for storage. Pen drives on the other hand can reach up to 2 Terabytes of data storage capacity. If the file she needs to save is high, Elsa should use the pen drive.

Scratch resistant

CDs can be scratched on the way to the house and lose some data or make it harder to extract. Pen drives do not have such problems are they are encased in an outer casing.

Portable and Accessible.

Pen drives are easy to carry which makes them portable and they are easier to use because a lot of computers do not have a CD drive but every computer has a port for a pen drive therefore making data in pen drives more accessible.

4 0
3 years ago
Other questions:
  • Adding a ____ to text adds depth and helps the letters display prominently.
    5·1 answer
  • What is the purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command?
    8·1 answer
  • A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the d
    8·2 answers
  • Which of the following are types of home internet service? Check all that apply
    7·1 answer
  • After experiencing several issues with an Active Directory domain controller, you have decided to perform a restore operation on
    10·1 answer
  • What steps should a user take to create a secondary address book?
    8·2 answers
  • Which option on the Format tab is used to modify particular portions of the chart?
    12·1 answer
  • In this lab you will learn about the concept of Normal Forms for refining your database design. You will then apply the normaliz
    15·1 answer
  • Which of the following is a valid c++ identifier a. mouse b. _int c. 2_stop d. float​
    10·1 answer
  • Suppose a packet is 10K bits long, the channel transmission rate connecting a sender and receiver is 10 Mbps, and the round-trip
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!