1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RoseWind [281]
3 years ago
11

Which four of the following qualify as fair use?

Computers and Technology
2 answers:
Bess [88]3 years ago
7 0
I would say option 1 :)
lora16 [44]3 years ago
6 0

Answer:

1 using the quote and citing it

Explanation:

You might be interested in
"What technology will examine the current state of a network device before allowing it can to connect to the network and force a
slava [35]

Answer:

a network access control

3 0
3 years ago
You type a complex formula in cell A20. You would like to make the same calculation in cells B20 through H20. To be efficient, y
fomenos

Answer:

Use autofill

Explanation:

In excel "autofill" is used to fill data in cells, which follows the pattern or logic applied in other cells. To apply same calculation of A20 in B20 to H20, we use autofill technique. Instead of copy pasting, or manually entering the complex formula this method is more suitable.  

4 0
3 years ago
One problem with using e-mail is that ______. a. It can be perceived as being too casual b. It is never appropriate for business
Free_Kalibri [48]
I personally feel that e-mail can be used for more business settings and as a more formal approach to things as opposed to a text, but option C seems to be more of an opinion.  I would go with C or D.
6 0
2 years ago
What should be done on a tablet in order for that tablet to cease all network connections?
ankoles [38]

Answer:

Turn On Airplane Mode

Explanation:

Turning off cellular does not turn off wifi.

Turning off wifi does not turn off cellular.

Turning off location services does not affect your network connections.

Airplane mode is what turns off all network connections.

3 0
3 years ago
Which of the following supportability analysis tools relies on scheduled maintenance to spot a failure before it impacts system
Schach [20]

Answer:

Option a is the correct answer for the above question.

Explanation:

RCM is an analysis tool that provides the function for analyzing the features of the physical assets for any organization. This tool is used to analyze the profits and loss problem of the organization so that an organization can earn more in his future.

The above question states that which analysis tool is used to tell about the loss factor of the organization then the answer is RCM which is stated on the option a. hence Option a is the correct answer while the other is not because--

  • Option b states about FMECA which is a tool used when the organization earns loss.
  • Option c states about LORA which is a repair tool.
  • Option d states about TAFT which is used all over the system.
8 0
2 years ago
Other questions:
  • Off topic lol but does anyone know of a free app that lets you track family and friends like their location? Thx
    15·2 answers
  • Explain which are of the brain you think might light up to show that you are telling a lie and why
    10·1 answer
  • It proceeds the statement causes execution of the current loop iteration to end and commence at the beginning of the next loop.
    10·1 answer
  • Which resources could be used a lot when installing a desktop app for synchronization purposes? Choose two answers.
    5·1 answer
  • Expain the application areas of ICT in education sector and E-commerce​
    12·1 answer
  • Write a program that takes a point (x,y) from theuser and find where does the point lies. The pointcan
    8·1 answer
  • You have been hired by a small company to install a backbone to connect four 100base-T Ethernet LANs (each using one 24-port hub
    12·1 answer
  • Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Referenc
    7·1 answer
  • What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.
    9·1 answer
  • which process consists of one application program following a logical access path (lap) and then a dbms following a physical acc
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!