1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naya [18.7K]
3 years ago
5

Who addicted to fnaf

Computers and Technology
2 answers:
zzz [600]3 years ago
7 0

Answer:

I am. I have written the entire story of it.

Download docx
Verizon [17]3 years ago
3 0

Answer

Not me

Explanation:

You might be interested in
Documenting Business Requirements helps developers control the scope of the system and prevents users from claiming that the new
tiny-mole [99]

Answer:

The answer is "True".

Explanation:

Industry demands documentation enables developers to monitor the system's range and protects users claims, that somehow the new system will not accomplish their business goals.

  • The main goal of this report is to offer everyone to be transparent, about what should be accomplished and when.  
  • It is the new business plan, that should be outlined in detail, that's why the given statement is true.
3 0
3 years ago
UCLA Extension's marketing department wants
damaskus [11]

The measure of central tendency to determine the effectiveness can be the mean, median or mode

It is true that you can calculate the mean as a measure of central tendency for reading the email

<h3>How to determine the true statement?</h3>

The survey result is given as:

  • Sample size, n = 40
  • Enrolled in one course = 26
  • Enrolled in three courses = 8
  • Not enrolled = 6

To determine if the email is effective or not, we simply carry out a test of significance.

However, if the central of tendency is to be used to determine the effectiveness; it is best to use the mean.

Hence, it is true that you can calculate the mean as a measure of central tendency for reading the email

Read more about measure of central tendency at:

brainly.com/question/17631693

7 0
2 years ago
Preventive Maintenance will will reduce potential hardware and Software Problems. Select two factors based on which Preventive m
zimovet [89]

Answer:

Computer location or environment

Computer Use

Explanation:

Preventive maintenance are maintenance done, on a routine or regular basis, to prevent the occurrence of downtime which are not planned due to the failure of equipment in the system, and to ensure continual functionality of the system

In a computer system, therefore, preventive maintenance should focus on conditions that are on the maximum limits of the specification of the system

Therefore, the preventive maintenance of the system of the computer system is based on;

1) The computer location, such as the presence of dust in the environment, that can clog the circuit board of the system, or exposure to liquid that require ensuring protective covering of parts, or the high temperatures, that may require extra cooling through the use of fans

2) The computer usage; Including how the computer is used, either continuously, or once in a while, the traffic the computer is experiencing, the presence of temporary files, and malicious programs, that require removal.

5 0
3 years ago
The technology Herman Hollerith created in the 1880s began the modern-day data processing function in computers.
adell [148]

Answer:

Punch Card Machine

Explanation:

The punch cards or the punched cards are also termed as the Hollerith cards or we also know them as the IBM cards. And they happen to be the paper cards where holes can be punched with the help of the hands or with the help of the machine for representing the computer instructions or data. And these were used on quite a large scale for inputting the data when we talk of the early computers. And this technology was developed by the Herman Hollerith.

7 0
4 years ago
How to copy and paste things that won't let you?
VLD [36.1K]
You take the ctrl buutton and hold it down while awlleclting the other setion you wouo would lieke to highlight.
5 0
3 years ago
Other questions:
  • TCP waits until it has received three duplicate ACKs before performing a fast retransmit. Why do you think the TCP designers cho
    13·1 answer
  • After brainstorming engineers may refine their ideas by making
    8·1 answer
  • Write a small program that asks the user how many asterisks it should print out. The user responds with a number, then the progr
    8·1 answer
  • Approximately what percent of desktop PCs are used for work-related purposes?
    13·2 answers
  • Clarisse is setting the white spaces at the edge of her Word document to be 1 inch. She is setting the _____.
    7·1 answer
  • What is the gap between those with access to new technologies and those without called?
    13·2 answers
  • Edhesive assignment 4
    14·1 answer
  • Which of these devices collects the most information on network activity?
    11·1 answer
  • Video games, regardless of their level of realish, had added a new dynamic to the world games and Entertainment the ability to s
    9·1 answer
  • Can rank u r guys in rocket leagye
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!