1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aneli [31]
3 years ago
15

Please help ASAP !!!

Computers and Technology
1 answer:
UNO [17]3 years ago
7 0

Answer:

the answer is Compose

Explanation:

You might be interested in
Disadvantage do you think one can have if he or she does use electronic media
Dima020 [189]
- discontinuity
- dependence on the electric power
and more
6 0
3 years ago
What happens once the Insert tab is used in PowerPoint to insert a chart into a presentation?
nordsb [41]

Answer:

•The user can edit the chart directly. hoped i;m right

Explanation:

6 0
3 years ago
You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. T
leva [86]

Answer:

more /var/log/auth.log

less /var/log/auth.log

Explanation:

The commands that can be used to view the content of the auth.log file page by page are:

more /var/log/auth.log

less /var/log/auth.log

5 0
3 years ago
Technician A says that a cracked exhaust manifold can affect oxygen sensor operation. Technician B says that a clogged air filte
liraira [26]

Answer:

tech A only

Explanation:

Technician A is right because a cracked exhaust manifold allows more oxygen into the exhaust stream, which affects oxygen sensor voltage. Technician B is wrong because a clogged air filter raises Hydrocarbons (HC) and also affects O2 (Oxygen) and CO (Carbon Monoxide) levels.

8 0
3 years ago
What is the most important concept in security and architecture design?
Alinara [238K]

Explanation:

The important concept of security architecture are as follows:

  • Relationships and Dependencies : It Signifies the relationship between the various components inside the IT architecture .
  • Form : It is associated with the IT architecture and can take a variety of forms .
  • Benefits : The advantages of the security architecture is the standardization, which makes it cheap and affordable , and can be re used .
  • Drivers: Security controls are determined by the following factors :
  • <u>Financial</u>
  • <u> Legal and regulatory</u>
  • <u>Risk management </u>
  • <u>Benchmarking and good practice </u>

7 0
3 years ago
Other questions:
  • Determine the number of bytes necessary to store an uncompressed binary image of size 4000 × 3000 pixels.
    9·1 answer
  • Which of the following functions and expressions will convert the ASCII character "Z" to its numeric equivalent ASCII code?
    7·1 answer
  • Ruby is creating a presentation. She wants each slide displayed at intervals of five seconds. Which feature in the presentation
    6·2 answers
  • Although the first GPS satellite was put into orbit in the ___________, GPS did not provide global coverage until _______.
    9·1 answer
  • I have a question on an IT crossword the question is as follows
    12·1 answer
  • A _____ refers to a product or service, such as a technical report, a training session, a piece of hardware, or a segment of sof
    12·2 answers
  • At the beginning of Section 5.2, it is stated that multiprogramming and multiprocessing present the same problems, with respect
    8·1 answer
  • In relation to data science,advances in technology has made it more feasible to do what
    5·1 answer
  • What are the features of G-mail <br><br>(Write in your own words)​
    10·2 answers
  • Does anybody play nba2k21 On ps4
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!