1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
forsale [732]
3 years ago
10

Question 5 of 25

Computers and Technology
2 answers:
hammer [34]3 years ago
4 0

Answer: it’s c

Explanation:

Arisa [49]3 years ago
3 0

Answer: d

Explanation; Hopes this helps!!

You might be interested in
Briefly explain how developers use a distributed version management system. You may assume that a master repository has been set
Akimi4 [234]

Answer:

Using version control tools like Git and Github.

Explanation:

Version control is a vital tool in programming in recent times. it helps to prevent loss of source codebase and creating unwanted folders for storing multiple codebases to prevent excess storage usage and time consumption.

Git and Github is a platform that handles version control and collaboration between co-workers. When a repository is created, its initial branch is called the master branch and when a staged code is committed, the commit is recorded. These records can be retrieved using the commit hash value and resetting the current unstaged file or code. A new branch can created to hold a different version of an application and merged later with the master branch.

4 0
3 years ago
Which of the following hardware developments allow objects to connect to a network and share data with any other application, se
Norma-Jean [14]
Server and device both are useful to object to connect to a network and share data with any other application.
5 0
3 years ago
Contemporary operation of networking technology is possible only through the usage of open-use technology and layering approache
eimsori [14]

Answer: TRUE

Explanation: Networking technology is the term used to describe the entire processes through which computer or mobile systems are linked up either through optic fibers,wireless systems in order to enhance effective communication across networks or regions.

OSI (open system interconnection), the earliest models partitions into seven layers and the OSI is known as model that creates partitioning a communication system classing them into abstraction layers.

8 0
3 years ago
The equipment that processes data in order to creatte informatin is called the -----
Greeley [361]

Answer: Hardware

Explanation: physical equipment that processes data in order to create information is called the Hardware.

6 0
4 years ago
What are some options available in the Write & Insert Fields group? Check all that apply.
GaryK [48]

Answer:

Highlight Merge Fields

Address Block

Greeting Line

Rules

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

A Mail Merge is a Microsoft Word feature that avails end users the ability to import data from other Microsoft applications such as Microsoft Access and Excel. Thus, an end user can use Mail Merge to create multiple documents (personalized letters and e-mails) at once and send to all individuals in a database query or table.

Hence, Mail Merge is a Microsoft Word feature that avails users the ability to insert fields from a Microsoft Access database into multiple copies of a Word document.

Some of the options available in the Write & Insert Fields group of Mail Merge are;

I. Highlight Merge Fields.

II. Address Block.

III. Greeting Line.

IV. Rules.

4 0
3 years ago
Other questions:
  • __________ ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter.
    15·1 answer
  • A technology company only hires applicants who are under the age of 30. This company could face possibly _________ consequences
    9·2 answers
  • Computers in a medical office should be protected by which of the following security tools?
    11·2 answers
  • Why is internet safety important
    14·2 answers
  • The false reject rate describes the number of legitimate users who are denied access because of a failure in the biometric devic
    11·1 answer
  • A blog is Group of answer choices a character in Lineage,
    15·1 answer
  • When considering changing the content of a cell which button should you press to leave the cell as it originally was
    12·2 answers
  • Your Google Search text ad has three main components. The first is a headline, and the second is a description. What's the third
    14·1 answer
  • Which of the following tasks will save a file over top of itself, using the same filename? A. Reload B. Save C. Save As D. Expor
    13·1 answer
  • HURRY MY COMPUTER IS ABOUT TO DIE ILL GIVE BRAINLYESTn
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!