1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dezoksy [38]
3 years ago
7

Small programs are shortcuts that are displayed as graphics pinned to your desktop are called_____

Computers and Technology
1 answer:
steposvetlana [31]3 years ago
3 0

Answer:

Taskbar or they are pinned to desktop

Explanation:

You might be interested in
All of the following are technical solutions to protecting user privacy except: Group of answer choices Data use policies Anonym
RoseWind [281]

Answer:

Data use policies

Explanation:

Technically data use policies are not specifically made to protect user privacy, however it also should not violate user privacy. Data use policies are required by law. They are compulsory disclosures that list the various ways in which data in the form of personal data of individuals is collected, shared or used by digital companies(companies that operate on the internet, make use of email lists, etc ) are used.

4 0
3 years ago
You are a network consultant who has been asked to attend an initial meeting with the executive management team of ElectroMyCycl
Snezhnost [94]

Answer:

ElectroMyCycle, LLC.

The research I will do before my initial meeting with the executive management team will be to find out the following:

4. Client’s suppliers and customers

5. Products and services offered

Explanation:

My research will concentrate on the types of products and services  that ElectroMyCycle is offering its customers and raw materials that it purchases from the suppliers, because the network assets are being installed to enhance business transactions between ElectroMyCycle and its customers and suppliers.  And as the company is expanding with more suppliers and customers, more products and services, the network configuration will be built around these stakeholders.

4 0
3 years ago
Kenny works with an IT company. His company is about to launch new software in the market. He has to ensure that this new softwa
butalik [34]

The job profile that Kenny is likely to have is  software analyst.

<h3>What is a job profile?</h3>

This is known to be that which states the details of an employee in regards to their  job.

Note that a software analyst is known to be that person who examines and maintain the software development process, carry out configuration management, and others.

So, The job profile that Kenny is likely to have is  software analyst.

Learn more about job profile from

brainly.com/question/3700565

#SPJ1

7 0
2 years ago
A section at The top of the page that makes it easy for a recipient to respond to a letter is called an
Vesna [10]

its a  return address

8 0
3 years ago
Read 2 more answers
Suppose we are given an arbitrary digraph G = (V, E) that may or may not be a DAG. Modify the topological ordering algorithm so
lianna [129]

Answer:

Check the explanation

Explanation:

We can utilize the above algorithm with a little in modification. If in each of the iteration, we discover a node with no inward edges, then we we’re expected succeed in creating a topological ordering.

If in a number of iteration, it becomes apparent that each of the node has a minimum of one inward edge, then there must be a presence of cycle in the graph.

So our algorithm in finding the cycle is this: continually follow an edge into the node we’re presently at (which is by choosing the first one on the adjacency list of inward edges to decrease the running time).

Since the entire node has an inward edge, we can do this continually or constantly until we revisit a node v for the first time.

The set of nodes that we will come across among these two successive visits is a cycle (which is traversed in the reverse direction).

3 0
4 years ago
Other questions:
  • What are some food project ideas?, its for my technology homework
    10·1 answer
  • How is a cell named?
    9·1 answer
  • The file extensions .webm, .m4v, and .ogv are used for:
    15·1 answer
  • 1. According to the Department of Commerce, _________ percent of single moms in the US qualified as poor.​
    8·1 answer
  • Information management should supply information in the form of meaningful images rather than raw data, which requires that we h
    13·1 answer
  • Microsoft Word
    15·2 answers
  • Select three advantages of cloud computing.
    10·1 answer
  • Which of the following screen elements is a horizontal bar that displays at the
    8·1 answer
  • Write a program that produces the following output: CCCCCCCCC ++ ++ CC ++ ++ CC ++++++++++++++ +++++++++++++++ CC ++++++++++++++
    14·1 answer
  • maximum cardinality indicates whether or not an instance of one entity class must be related to at least one instance of another
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!