1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
3 years ago
11

1 punto

Computers and Technology
1 answer:
sergey [27]3 years ago
3 0

Answer:

c Proceso productivo

Explanation:

You might be interested in
What is authenticity​
jeka94

Answer:

the quality of being authentic

Explanation:

7 0
3 years ago
Which of the following are true about cryptocurrency wallets?
dezoksy [38]

Answer:

Looks like it is a multiple choice question

and you didn't give any choice

5 0
3 years ago
The critical path of a network is the A. shortest time path through the network. B. path with the most activities. C. longest ti
S_A_V [24]

Answer: Option [C] : The longest time path through the network.

Explanation:

The critical path of a network is the longest time path through the network.

8 0
3 years ago
What is a subjective point of view
anastassius [24]

Answer:

one based on opinion rather than fact, upon which reasonable people could disagree.

Explanation:

An example of a subjective point of view is a position taken on whether a movie or book is good or bad

6 0
3 years ago
Read 2 more answers
A technician is building a thick client workstation that would be used to run a database and wants to ensure the best protection
emmasim [6.3K]

Answer: ECC memory

Explanation:Error-correcting code(ECC) memory is used for the detection as well as correction of the internal storage data in the operating system. It is the memory code that cannot tolerated any type of the corruption in the data storage.

The ECC memory is usually found in the fields like financial computing, scientific etc.It is a reliable memory and provides high protection.Thus the technician should put the ECC memory in the workstation.

7 0
3 years ago
Other questions:
  • describe briefly one scenario where records stored in a computer frequently need to be searched. state why the searches may be c
    9·2 answers
  • Add a throw statement to the processNumbers function that throws the message "All elements in the list should be numbers." if on
    12·1 answer
  • True / False
    5·1 answer
  • What method of the Math object can be used to return the largest value from the values that are passed to it?
    14·1 answer
  • The 7-bit ASCII code for the character ‘&’ is: 0100110 An odd parity check bit is now added to this code so 8 bits are trans
    12·1 answer
  • Who said "BAM WHAT?!" On disney channel?
    5·2 answers
  • Which data type is 2.5?<br> single<br> int<br> float<br> string
    10·1 answer
  • And<br>Why the computer is called dilligent<br>Versatile machine?give long answer ​
    10·1 answer
  • State the name of the following computer components​
    14·2 answers
  • Device drivers perform the actual communication between physical devices and the operating system. Group of answer choices True
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!