1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Citrus2011 [14]
3 years ago
11

1.Which one of the following buttons returns a window to its original size?

Computers and Technology
1 answer:
Ber [7]3 years ago
7 0

Answer:

1. D

2.C

3. D

4. A

5. B

6.B

7.B or D

8.C

Explanation:

Not 100% sure about 3,4, 8

You might be interested in
In the LC-3, how many memory words are used to store the string "rainbow"?
oksian1 [2.3K]
The number of memory words used to store the string "rainbow" is 8.
5 0
3 years ago
This speaker could be an instructor, a politician on the television, or even a radio or television commercial. What barriers wer
Shkiper50 [21]

Answer:

Electromagnetic interference and noise from the transmitting or receiving device.

Explanation:

Communication involves four processes, they are; encoding, sending, decoding, and feedback. A message, during this process of communication, can be altered, this is known as noise.

Telecommunication is simply communication between long distances. The effect of noise is more pronounced and can be noticed by listeners. These noises are produced by the transmitter and electromagnetic signals or waves of other transmitting devices.

6 0
3 years ago
What are the links between the operating systems, the software, and hardware components in the network, firewall, and IDS that m
LuckyWell [14K]

Answer:

In several organizations, the operating system (OS) functions at the core of the personal computers in use and the servers. The OS ought to be secure from external threats to its stored data and other resources.

Explanation:

In this regard, Intrusion detection systems play a critical role in protecting the sensitive data, along with software firewalls. Hardware firewalls protect the hardware elements in the network (such as storage drivers etc), the IDS and as well as the IPS.

4 0
3 years ago
What tasks do most operating systems perform?
devlian [24]

I would say: This is most common.

3, 5, 6

8 0
2 years ago
Read 2 more answers
A user has connected an external monitor to a laptop vga port. what is the next step the user should take?
svetoff [14.1K]

The next step that the user should take after connecting an external monitor to a laptop VGA port is to take advantage of the FN key by using it, together with the multi-purpose key in which is helpful in sending video for an external display.

3 0
2 years ago
Other questions:
  • Jason works as an accountant in a department store. He needs to keep a daily record of all the invoices issued by the store. Whi
    5·2 answers
  • Joaquin is considering a career as an animator and wants to know more about the daily work of an average animator. Which strateg
    11·1 answer
  • Suppose you were assigned to develop a logical model of the registration system at a school or college. would you be better off
    9·1 answer
  • 6. Which of the following is malware? (1 point)
    15·2 answers
  • What is cyber ethics​
    10·2 answers
  • Creating Classes
    10·1 answer
  • What is GIGO ?<br>plz answer me​
    7·1 answer
  • Which technology do online storesusually use to present customized content?
    10·1 answer
  • What are the steps in preparing a bootable USB installer?​
    11·1 answer
  • The Texas Department of Education has offices throughout the state covering more than 268,000 square miles. State documents are
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!