1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kaheart [24]
3 years ago
12

How do you mark answers brainliest? it looks like they changed it and now idk how to

Computers and Technology
1 answer:
Galina-37 [17]3 years ago
7 0
You just need to have more than one person answer!
You might be interested in
What do I do if my friend wants me to watch a video at my house?
steposvetlana [31]

Have him email the link to you and click on the it.

hope this helps, have a great day!

3 0
3 years ago
Read 2 more answers
Explain the components of Information System?​
slavikrds [6]

Answer:

An information system is essentially made up of five components hardware, software, database, network and people. These five components integrate to perform input, process, output, feedback and control. Hardware consists of input/output device, processor, operating system and media devices.

Explanation:

7 0
3 years ago
Alice recently purchased a new cell phone. After her vacation, Alice wanted to transfer her holiday photos to her computer to do
dmitriy555 [2]

Answer:

<u>D.) Device Manager</u>

Explanation:

Indeed, the device manager administrative tool found on Windows allows the user to set up or add new hardware devices attached to the computer system.

For example, this tool allows the user to add external devices to the computer such as a printer, mobile device, etc that may not automatically be displayed.

5 0
3 years ago
Which of the following describe a required
ELEN [110]

Answer:

The last 2 point in the given question is the correct answer to the given question i.e

  • an argument passed to the function in the  correct positional order
  • an argument wherein the number of  arguments in the function call should match  the definition of the function.

Explanation:

The required  argument are those argument that are passing to the method the in the right location order.In the required argument the number of arguments in the call method must match the definition of the function .

For example

def fun( s ): #function definition  

   print(s) #display s

fun('er')#calling

In this example  there is  function fun() in which we pass the argument 'er'  we call that function from main() .The control moves to the function definition it checks the number of argument in the calling function fun() is matched with the definition of function fun()  and print 'er'.

All the other option are not describing the required  argument that's why this is incorrect option .

8 0
4 years ago
Explain how the use of Git and a shared public Git repository simplifies the process of managing opensource development when man
GrogVix [38]

Answer:

Git is a collaborative software used by members of a group to share and work on the same projects. Github is a web application that uses git to link people working together on a codebase. With git and Github, opensource projects can be accessed and collaborated on by volunteers.

Explanation:

Opensource development is a collaborative group of developers working together on a software or platform with a general public license. When working on an opensource project, each developer is able to folk or get a copy of the repository downloaded to a local computer which they can work on and push or update to the actual online repository if the condition for a change is met.

4 0
3 years ago
Other questions:
  • 9. The best way to insert an existing Excel chart into a document is to A. use the Object command. B. click the Insert tab and c
    6·2 answers
  • Which one of these variables has an illegal name?
    11·1 answer
  • Routing connects different network segments and decides where __________are sent to
    7·1 answer
  • A _____ is a unique name that identifies an Internet site. URL Browser AOL IA
    13·1 answer
  • From which type of data storage does the CPU load information for processing during normal operation?
    14·1 answer
  • Computer privacy typically occurs when which of the following is violated?
    6·1 answer
  • Credible sites contain __________ information,
    7·2 answers
  • Although your project has been accepted by the customer, the contract with the system vendor specifies that it will support the
    13·1 answer
  • Will give brainliest
    8·1 answer
  • Find 10 real world challenges and their corresponding solutions
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!