1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa [10]
3 years ago
12

Which statement about the Weather Bar in the Outlook calendar is true?

Computers and Technology
1 answer:
NARA [144]3 years ago
3 0

Answer:

C

Explanation:

You might be interested in
An object completes one round of circle of radius 7m in 20 sec. Distance travelled after 10 sec is? ​
Ivanshal [37]

Answer:

distance \: travelled \:  = 2\pi \\  \\ 44cm \:  \:  \:  \:  \\ speed \:  =  \frac{44}{2.2}  \ \\ distance \: travelled \: in \: los = 10 \times 2.2 = 22cm \\  \\ total \: distance = 44 + 22 = 66metres

5 0
3 years ago
The ........ tag is used to create a link to another document​
Free_Kalibri [48]

Answer:

The "a" tag or <a></a> and its "h<u>r</u>ef" attribute <a href="#"></a>

Explanation:

In html there is only one way to create a link to an external source or a bookmark. The tag is created using the element <a>.

The attribute "href" is then added to describe the link of where it is to point to.

Example:

<a href="google.com">Go to Google</a>

While the text in between the tag describes what the link is about.

7 0
3 years ago
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
Anni [7]

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

  • <u>Stack-based</u> - It will become more popular to use such memory, as well as that's only available during implementation of any code.
  • <u>Heap-based</u> - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

brainly.com/question/4952591

6 0
3 years ago
A technician has been asked to upgrade a processor and needs to do some research. The computer is just a couple of years old. Wh
DanielleElmas [232]

Answer:

The two best options can be processors like inlet i7 4.0 GHZ 8th generation processor, and two popular models are core and Pentium for inlet. Similarly for AMD we have 4 GHZ 8 core AMD processors. And two very popular examples are Athlon and Phenom.

You need to check the Graphics, clock speed etc. as well to end up with the best processor. Also make sure that it is motherboard compatible, and to the motherboard that you are having, If number of core is more and frequency is high, it means Processor is better, and same thing applies for generations as well.

Explanation:

The answer is self explanatory.

6 0
4 years ago
Match the IP Protections Patent, Copyright and Trademark into the following cases:
Vesna [10]

Answer:

A) copyright

B) copyright

C)Trade mark

D) copyright

E)Patent

Explanation:

Patent can be regarded as a form of intellectual property which helps the owner of an invention to others to sell or use the invention for some period of time. Example of this is a patent that protect microwave oven.

trademark is form of intellectual property, this could be inform of symbols, words that differentiate the product of a party from another. Example of this is a bite of apple that represents apple products.

Copyright can be regarded as a legal right given to those that owns a intellectual property which gives him/her right to copy and exclude others from reaping from where they did not sow. The owner get exclusive right to reproduce the copy.

Below is the match of the intellectual property with the examples.

a. books, poems<> Copyright

b. music, movies, paintings<> Copyright

c. company logo<> Trademark

d. software<>Copyright

e. combinations of materials to make drugs<> patent

8 0
3 years ago
Other questions:
  • Sarah's research shows that business information management professionals also perform the duties of other professionals. Which
    9·1 answer
  • Differences between iphone 6 and 6s
    6·1 answer
  • Which operations security control prevents unauthorized intruders from internally or externally accessing the system and lowers
    10·1 answer
  • The Maui coffee shop sells coffee at $10.50 a pound plus the cost of shipping. Each order ships for $0.86 per pound + $1.50 fixe
    14·1 answer
  • Examine the following algorithm.
    9·1 answer
  • What is alfred anderson in creole?
    6·1 answer
  • 31. Explain what the program does. Write out the output 20 PRINT "Hellooo00000000000, world!" 30 PRINT "I'm learning about comma
    7·1 answer
  • Edhesive assignment 1 movie ratings
    9·1 answer
  • Which of these is not enumerated as a motivation to create accessible web content?
    10·1 answer
  • A ______ system writes data on two or more disks simultaneously, thereby creating a complete copy of all the information on mult
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!