1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AVprozaik [17]
2 years ago
9

Whats the answer? true or false I accidentally clicked false.

Computers and Technology
2 answers:
Anarel [89]2 years ago
6 0

Answer:

false i think

Explanation:

Phantasy [73]2 years ago
6 0
The correct answer would be false
You might be interested in
When performing forensics on an Apple computer, what operating system are you the most likely to encounter QUIZLET
lidiya [134]

When performing forensics on an Apple computer, the operating system are you the most likely to encounter is iOS.

<h3>What is operating system forensics?</h3>

A Operating System Forensics is known to be a method used for the retrieving of any useful information from the Operating System (OS) of the computer or any kind of mobile device.

Note that the reasons for collecting this information is so as to get all the empirical evidence against any kind of perpetrator.

Learn more about operating system from

brainly.com/question/1763761

3 0
1 year ago
A _____ is a specially formatted file that, once mounted, or connected to a virtual machine appear and operate pretty much ident
Sever21 [200]

A <u>Virtual hard disk</u> is a specially formatted file that, once mounted, or connected to a virtual machine appear and operate pretty much identically to a physical hard drive.

<h3>What is a virtual hard disk?</h3>

A virtual hard disk (VHD) is a disk picture file format for storing the entire ranges of a computer's hard drive.

The disk image, sometimes called a virtual machine (VM), duplicates an existing hard drive, including all data and structural elements.

<h3>Why would you count a virtual hard disk?</h3>

Typically, a VHD comes in handy to add additional storage to a Hyper-V virtual machine, and thanks to its capacity to support other OS installations, you can even use this storage virtualization technology to make a dual-boot system without modifying an existing partition.

To learn more about  virtual hard disk , refer

brainly.com/question/4733444

#SPJ4

4 0
1 year ago
Which is a disadvantage of pie charts?
anzhelika [568]
While the reader of a pie chart can clearly see which categories dominate, it can be difficult to see categories that occupy only a small percentage of the chart. This problem becomes worse if there are many small categories in the chart. Labeling the categories can also be difficult.
6 0
3 years ago
_________ is a hybrid cryptosystem that combines some of the best available cryptographic algorithms and has become the open-sou
Maurinko [17]

Answer:

The correct answer is PGP i.e  "Pretty Good Privacy" .

Explanation:

Pretty Good Privacy is an encryption algorithm that gives the database interaction with the confidentiality and authorization.Pretty Good Privacy is security algorithm which gives the security into the mail . login ,decryption ,encryption are the example of the "Pretty Good Privacy" .

Pretty Good Privacy  is a type of  hybrid cryptosystem that incorporates cryptographic algorithms and it has de facto open source standard for the mail and the file storage .

3 0
3 years ago
Do you think tracking your screen time will reduce your usage? Why or Why not?
dezoksy [38]

Answer:

I dont think it will help much

Explanation:

Well, just tracking it will not necessarily make you stop. I would recommend putting app limits or downtime (if you have a mac). Also make a log. Write down how much time you need for different things, like 1 hour of free time, 5 hours of schoolwork. Also, make a schedule based off the things you put on your log.

I found doing this helped me reduce my time on screen and made me more productive.

6 0
3 years ago
Other questions:
  • Which wireless device does the manager most likely have before being offered the upgrade by her supervisor?
    8·2 answers
  • 1. Perform the following Binary Additions 101101 + 10100 *
    13·2 answers
  • The Magic Square is a grid with 3 rows and 3 columns with the following properties: • The grid contains every number from 1 to 9
    9·1 answer
  • What connector has 4 pins, is used for older IDE drives and some SATA drives, and can provide +5 V and +12 V power outputs?
    11·1 answer
  • The communication channel used in IMC must rev: 12_06_2018_QC_ CDR-223 Multiple Choice match the traditional channel used in tha
    14·1 answer
  • How to charge your phone quickly
    9·2 answers
  • Which types of files can be used to define Kubernetes manifest files? yaml, json, yaml and text files
    5·1 answer
  • Creating a Venn diagram takes specialized computer software.
    15·2 answers
  • State any three reasons why users attach speakers to your computer​
    15·2 answers
  • What are the different Stape of data processing cycle?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!