1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fredd [130]
3 years ago
7

drag each type of document to the correct location on the table. Drag each document to its respective category

Computers and Technology
1 answer:
trapecia [35]3 years ago
4 0

Answer:

What? I don't get it.

Explanation:

You might be interested in
Subratract 11100 from 1011 by using 1's complement method step by step​
tia_tia [17]
10089 is gonna be your anwser
7 0
3 years ago
Is anyone good with auto Cad?
nydimaria [60]
Yes,I am very good with auto Cad
3 0
3 years ago
When an object is falling because of gravity, the following formulacan be used to determine the distance the object falls in asp
ser-zykov [4K]

Answer:

True

Explanation:

When an object is falling under the influence of gravity, the distance of fall as a function of time is given by:

D(t)=ut + 1/2 * a * t^2

Where

u = initial velocity of the object ( = 0 in this case as the object is falling only under gravity),

a = acceleration of the falling object = g = 9.8 m/s^2 which represents the acceleration due to gravity.

Simplifying,

D(t) = 1/2 * g * t^2

6 0
3 years ago
Most shops require the technician to enter a starting and ending time on the repair order to track the actual time the vehicle w
Alecsey [184]

The time being referred to is C. cycle time. Cycle time refers to the amount of time from start to end of a process as agreed and defined by a service provider (in this case, the technician) and the customer. Cycle time can also be lengthened or shortened.

5 0
4 years ago
Read 2 more answers
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Other questions:
  • What does a company’s code of ethics cover
    8·2 answers
  • Validating the users claimed identity is called which of the following?A. AuthenticationB. IdentificationC. VerificationD. Valid
    15·1 answer
  • When is e-mail an appropriate channel for goodwill messages? If you frequently communicate with the receiver by e-mail and are c
    15·1 answer
  • How can rows be added to a table? Check all that apply
    13·2 answers
  • A grade of B is worth Grade points<br><br><br> A) 3.0<br> B) 80<br> C)2.0<br> D)4.0
    13·2 answers
  • The Outline tab and the Slides tab can be open at the same time.
    7·1 answer
  • Convert 11/10 to Decimal​
    14·1 answer
  • Describe the effects technology, particularly computers, has had on mechanical labor.
    8·1 answer
  • Help a brotha out..................
    10·1 answer
  • Fill in the blank to complete the sentence.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!