1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arisa [49]
4 years ago
9

To recover a deleted document, what would you choose in the info window?

Computers and Technology
1 answer:
Natasha2012 [34]4 years ago
7 0
"Restore", or in Spanish, "Restaurar".
You might be interested in
________models software in terms similar to those that people use to describe real- world objects.
mr_godi [17]

Answer:

The correct answer is C - Object-oriented design.

Explanation:

Object-oriented design defines code or software as objects. These objects represent instances of a real-life situation. For example, an animal class consist of a dog, cat, lion. A dog therefore is n instance of the animal class.

Objects are described as having properties and behaviours. Properties are variables, arrays, sets, maps etc and behaviours are the functions and methods that manipulate these data.

Object-oriented programming is done based on this design.

7 0
4 years ago
Please help me with this question. I don’t get it
Lelechka [254]
A - they all use microprocessors to compute and store data.
3 0
3 years ago
Read 2 more answers
Which of the following is necessary to connect a computer outside of the hospital to the hospital's server?
dybincka [34]

Answer:

The answer is "Option C"

Explanation:

VPN reflects virtual private networking, providing secure networking and strong links between private networks. It helps us to use remote machines, that are like on the same local site, and we use VPN to reach the hospital website. And other choices which could be listed as follows that is not correct:

  • In option A, WAN represents a wide area network, it's used to connect computers through networking, that's why it's not correct.
  • In option B, LAN stands for local area network, it shares a common line or wireless links for communication, that's why it is not correct.
  • In option D, FOV stands for field of view that is used for gaming purposes, that's why it is not correct.
7 0
4 years ago
Here is the header for a function named computeValue:
zhuklara [117]

Answer:

B) computeValue(10);

Explanation:

Given

Header: void computeValue(int value)

Required

Determine the valid call

To call a function from another function or from the main, the following syntax has to be used.

<em>function-name(parameter-1, parameter-2, parameter-3,.....,parameter-n);</em>

<em />

In the function header given:, the following can be observed:

  • The function name is computeValue
  • It has only one parameter and it is of type integer

So, to call the function; we make use of computeValue(10);

Where 10 represents the value of the parameter (i.e. argument)

7 0
3 years ago
What is the boundary folding method?
Romashka [77]

Answer:

 Boundary folding method is basically used in the java algorithm and in the hash table. In the hash function, the left and the right value are basically folded in the fixed boundary between the given center values by using the boundary folding methods.

There are basically two types of folding method in the hashing that are:

  • Folding shift
  • Folding boundary

In the folding boundary method the outside value are get reversed and the alternate values are get flipped at the boundary folding method.

4 0
4 years ago
Other questions:
  • Using a database of precomputed hashes from sequentially calculated passwords called a(n) __________, an attacker can simply loo
    14·1 answer
  • I only want someones opinion on this not anything you would find in a book.
    7·1 answer
  • The unique global address for a web page or other resource on the internet is called the ________.
    7·1 answer
  • The protocol that enables computers on the Internet to communicate with one another is called _____.
    10·2 answers
  • Bushman and bonacci (2004) found that prejudiced participants were ____ likely to return a lost e-mail that had been addressed t
    5·1 answer
  • ECG mashine is an example of
    12·1 answer
  • For Windows 9x and Windows NT operating systems, which authentication protocol should be used that protects the authentication p
    11·1 answer
  • What is a orogram to block access to websites
    15·1 answer
  • Which of the following is true about radio waves? They have short wavelengths. They have high energies. They reveal hot gases. T
    10·2 answers
  • Whois the person start programming​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!