1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dangina [55]
3 years ago
14

SLA:

Computers and Technology
1 answer:
Sphinxa [80]3 years ago
8 0

Answer:

Objective

1 . b

2.a

3.b

4.a

5.a

6.b

7.a

8.b

9.a

10.a

You might be interested in
How do I make someone "Brainiest". <br> First person to reply will get "Brainiest"
xxTIMURxx [149]

Answer:

Usually when someone answers a question there would be an option to mark the brainliest. However, you only get one every like 24 hrs so if you already gave someone brainliest you can't give it to someone else for a while

Explanation:

6 0
3 years ago
Read 2 more answers
Explain the working principal of computer system with suitable diagarm​
disa [49]

Answer:

Based on the instructions given, a computer receives data through an input unit and sends it back through an output system after it processes the data. Once the data is obtained, the central processing unit (CPU) takes over and processes the information it was provided along with the aid of other components.

3 0
3 years ago
The ____ object can trigger a selectedindexchanged event when a selection is made
Maslowich

The objects that can trigger a selected index changed event when a selection is made are the following;

<span>·         </span>Combo box – This allows the user to type or select value

<span>·         </span>Drop down list – This allows the data entry to be placed easier and to limit entries

<span>·         </span>List box – this is considered to be a control in which contains a collection of more than one items

<span> </span>

4 0
3 years ago
Which of the following is similar to defense in depth and supports multiple layers of security?a. Defense in depthb. Diversity o
Lina20 [59]

Answer: B) Diversity of defense

Explanation:

 Diversity of defense support the multiple layer of security and it uses in different security mechanisms. The diversity of defense is the significant in the security system.

It basically reduces the configuration error and bug in the system. It also reduces the cost and complexity of the system. But it takes longer time for installing multiple different system. It is similar to defense in depth as, it also support the multiple layer of security.

 

3 0
3 years ago
The documents created in ms-excel is call what?​
rosijanka [135]

Answer:

It is called a Spreadsheet

5 0
3 years ago
Read 2 more answers
Other questions:
  • What is the function of the Status bar in Outlook 2010?
    9·1 answer
  • What does microsoft recommend for large organizations requiring desktop virtualization for many clients? quizlewt?
    10·1 answer
  • You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you r
    9·1 answer
  • Is it more beneficial to have many folders or is it better to " nest subfolders? Explain your response
    5·1 answer
  • What can you say about the following Java class definition?
    10·1 answer
  • What is the smallest amount of information called?
    13·2 answers
  • How can computational thinking techniques be applied to software development
    6·1 answer
  • Unlike radio frequency identification (RFID) tags, bar codes: Question 30 options: require a reader that tunes into a specific f
    14·1 answer
  • What is the output of this program?
    10·2 answers
  • Write the steps involving coping and pasting a file in a folder​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!