1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlexFokin [52]
3 years ago
13

Complete the concept map on computer as outlined below​

Computers and Technology
1 answer:
USPshnik [31]3 years ago
6 0

Answer:

Here is your answer.

have a great day

You might be interested in
. Write a code to define a linked list node using the above defined structure student (i.e. the data of the node is a student st
enyata [817]

Answer:

struct node{

   student data;

   node* next;

};

Explanation:

The above written is the segment of code is the structure of node of the linked list.The data of the node is type student.So the data of the node of the linked list will consist of the student details and the next is the pointer which holds the address of the next node.

8 0
3 years ago
Which image-editing tool can be used to help remove spots and other marks from an image?
Mrac [35]
C. Healing brush
That’s the answer
5 0
2 years ago
1. Which of the following describes a way of memorizing a poem using a mnemonic device?
xenn [34]

Answer:

Singing the words of the poem to the tune of Happy Birthday"

Explanation:

Mnemonic devices are those tools which can be used to improve a persons ability to remember something efficiently. In short, it a technique to memorize something in short period of time and remember it for longer period of time.

Memorizing a poem by singing it to the tune of Happy birthday is also a technique to remember the poem and memorizing it efficiently.

3 0
3 years ago
When creating a report, you should consider all of the following EXCEPT (Points : 4) who will use the report
barxatty [35]

Answer: Number of records input into the report

Explanation: Creating the report includes the factors like maintaining the record, updating data, designing content etc. The content of the report has the parameter to maintain so that it can be up to date and can be efficient to the user.

The parameters that are considered while making the report are confidential content should be specially considered ,user of the report , purpose of the report,etc. The only factor that is not accountable is input.There can be number of inputs that can be entered in the report because they have huge sheet space.

8 0
3 years ago
Consider a system which has a memory access time of 300 nsec. An average page fault takes around 10 millisecond to get serviced.
vladimir1956 [14]

Answer 72 ncs is the answer im pretty sure

8 0
2 years ago
Read 2 more answers
Other questions:
  • Sniffing network and wireless traffic, intercepting bluetooth traffic, and even using equipment to remotely pull information fro
    12·1 answer
  • You have users who connect to the corporate network using their laptops. because these computers often access confidential data,
    9·1 answer
  • Which of the following is not an operating system
    11·2 answers
  • _____ lets you look at two documents at the same time.
    14·1 answer
  • Which statement about broadcasting a slideshow online is true?
    14·2 answers
  • Alguien porfavor me dice como cambiar de idioma en brainly
    15·1 answer
  • SOMEONE PLEASE HELP ME WITH THIS ILL GIVE YOU BRAINLY IF YOU GET IT RIGHT PLEASE!!!!!
    13·2 answers
  • How would you want to change the copyright laws?
    11·1 answer
  • Choose the correct statement:_______.
    14·1 answer
  • Cara is cleaning her computer when she notices a loose cable connecting to her printer. Which two ports would the cable most lik
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!