1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gtnhenbr [62]
3 years ago
11

Look at the picture below explain and write your answer on your answer sheet​

Computers and Technology
1 answer:
IRISSAK [1]3 years ago
6 0

Answer:

I use a plant sprinkler

how to use? we just need to fill the water and then pour it on the plants.

You might be interested in
Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office
Colt1911 [192]

Answer:

Share documents and set specific permissions.

Explanation:

For a computer network with Windows OS Jane and the technician can create a Shared Folder by right-clicking on it and selecting properties.

Then on the Share and Security tabs of the properties, they can set which specific users and/or roles will have access to the shared folder. They will also have to set what permission level will be granted, such as <em>full access, read only, etc.</em>

The managers can access the shared files using <em>Windows explorer</em> either by searching shared folders in their Network, or by typing the shared folder address usually something like \\JANE_PC/SharedFolder.

6 0
3 years ago
Read 2 more answers
Which of these is NOT a cloud-based system?
-BARSIC- [3]
Skype isn't a cloud based system. Cloud based systems are online storage systems. Google Drive, Dropbox, and SkyDrive are all pieces of software which allow you to store data on a remote server over the internet. Skype is just a program.
7 0
3 years ago
What command issued from the command prompt will show the route that a packet travels from the issuing computer to another compu
svetoff [14.1K]

Answer:

B)tracert

Explanation:

Tracery Command can be regarded as

network diagnostic tool, it is used in tracking process of pathway of packet ranging from source to destination on IP network. It as well allows to know real time of each hops that are been taken by a packet as it enroutes to it's destination. The traceroute can be run by following these steps:

✓Open the run window

✓Open Command prompt, this can be done by enter "cmd" then enter.

✓ input" tracert" then destination ( Ip address or web address)

It should be noted that Tracery command issued from the command prompt will show the route that a packet travels from the issuing computer to another computer.

6 0
3 years ago
Define application software​
sp2606 [1]

Answer: An application software is a type of software that the user interacts with, while a system software is a type of software that the system interacts with.

Hope this helped you :)

7 0
3 years ago
The page-replacement policy means that pages are not placed to make more space. A. True B. False
BabaBlast [244]

Answer:

B. False

Explanation:

A page-replacement policy can be defined as a set of algorithm that instructs the operating systems on what memory page is to be swapped, paged out or written to disk in order to allocate more memory as they're required by various active processes during virtual memory management.

Some of the algorithms or techniques used by the operating system for page-replacement policy are;

1. Last In First Out (LIFO).

2. First In First Out (FIFO).

3. Least Recently Used (LRU).

4. Least Frequently Used (LFU).

5. Optimal (OPT or MIN).

Hence, the page-replacement policy means that pages are placed to make more space and to minimize the total number of page that would be missing.

7 0
3 years ago
Other questions:
  • According to the partnership for 21st-century learning critical thinking ability includes all the following skills except
    15·1 answer
  • You want to transfer a document from one computer to another, and you want the document to be encrypted. The destination compute
    14·1 answer
  • In a doubly linked list, every nodecontains the address of the next node and the previousnode except for the ____ node.
    8·1 answer
  • Can yall please take these points.
    11·2 answers
  • A personal business letter is a letter that is ____.
    13·1 answer
  • we studied FIFO, Priority, Round Robin (RR), and Weighted Fair Queueing (WFQ) packet scheduling disciplines. Which of these queu
    12·1 answer
  • Computer crimes are a big concern since the creation of innovative technological advances; which is/are examples of computer cri
    13·2 answers
  • In information security, a specification of a model to be followed during the design, selection, and initial and ongoing impleme
    5·1 answer
  • How does Accenture help companies harness the power of data to achieve optimal business outcomes?
    9·2 answers
  • I hack3d into my schools computer system to unblock everything but now I am scared that I am going to get caught so I want to de
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!