1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arisa [49]
2 years ago
14

Chang investigates ways to improve the interactivity of computer hardware. His job title is best described as ✓ Computer and Inf

ormation Research Scientist. Shay writes programs to make operating systems easier for people to use. Her job title is best described as ✓ Software Developer, Systems Software.
Dayna writes code for computer programs that allow people to communicate with each other. Her job title is best described as ✓ Software Developer, Applications​
Computers and Technology
1 answer:
xeze [42]2 years ago
3 0

Answer:

B, D, C

Explanation:

got it right

You might be interested in
PLEASE HELP!
lawyer [7]

To block link that keeps popping up everywhere, one can:

  • Use your browser and click on block Pop-ups  in settings
  • Install an antivirus.

<h3>How do I stop pop-up links?</h3>

One can do so if they Manage the pop-up by blocking it in the Chrome browser where they:

  • Click on Settings from the Chrome menu.
  • input 'pop' in the search bar.
  • Select Site Settings  and then select Pop-ups and redirects.
  • Here one can toggle the Pop-ups and redirections option to Blocked them.

Therefore, To block link that keeps popping up everywhere, one can:

  • Use your browser and click on block Pop-ups  in settings
  • Install an antivirus.

Learn more about pop up link from

brainly.com/question/13666301

#SPJ1

4 0
2 years ago
Google, Yahoo, and Microsoft search all use the same Web crawler.
statuscvo [17]
The answer is going to be False they do not use the same Web crawler. 
HOPES THIS HELP:)
4 0
3 years ago
Read 2 more answers
Operating systems are designed to work with specific hardware. Which operating system works with Apple computers?
Ghella [55]
2. Mac and to be more precisely, OS X
5 0
3 years ago
Read 2 more answers
7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering personal i
beks73 [17]

Answer:

D

Explanation:

Malware can be used for many things, a click of a button can send complete access to the attacking system. Malware comes in all formes and powers.

4 0
2 years ago
Which option describes wearable technology? A. the incorporation of technology into objects we use regularly B. rugged technolog
vichka [17]

The correct answer is

A.  the incorporation of technology into objects we use regularly

#Platogang

8 0
3 years ago
Other questions:
  • . Write a recursive function names factorial to compute the factorial of the parameter. Also write the main function, where you
    15·1 answer
  • Which of the following is true? A)Checks and Debit Cards both withdraw money directly from a bank account. B)Checks are the most
    13·2 answers
  • Malware that corrupts the target operating system in such a manner that a network defender can no longer trust the native OS is
    15·1 answer
  • Define a function CoordTransform() that transforms its first two input parameters xVal and yVal into two output parameters xValN
    7·2 answers
  • A group of students are collaborating on an online research project. What is an example of appropriate online behavior?
    10·2 answers
  • A student is curious about how a Web site appears on his computer screen. On a piece of paper,
    9·1 answer
  • EXCEL 2016:
    8·2 answers
  • What are the concerns surrounding 5G cellular networks?​
    6·1 answer
  • PLS HELP SOON
    15·1 answer
  • Microsoft recommends when that you create passwords with upper and lowercase letters, numbers, symbols, and use at least _______
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!