1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
const2013 [10]
3 years ago
9

In GD, what does RWR stands for?

Computers and Technology
1 answer:
11Alexandr11 [23.1K]3 years ago
6 0

Answer:

Dont know hehe 点击[http://pinyin.cn/e378409]查看表情

You might be interested in
Jiwoo is a professional photographer. Identify and describe a photography scenario where Jiwoo would need to consider the ethics
jok3333 [9.3K]

Answer:

Photography ethics are the principles that guide the way we take and share photos. Why is photography ethic so important? If we don't have morality in the way we use photography, we risk Aesthetics Ethics deals with the rights and wrongs and Aesthetics deals with beauty or otherwise. When we correct, manipulate or enhance images, the factors of ethics and aesthetics must always be kept in consideration. Where Does One Draw The Line if you add or remove something there that wasn’t in the scene you have crossed from documentary to fictional art. Exceptions In other cases, the only way to present a truer representation of reality is through a composite rather than with a single exposure.

Explanation:

I hope this helps I little

7 0
3 years ago
Cache memory is a special group of very fast memory circuitry located on or close to the CPU that is used to speed up processing
antoniya [11.8K]

Answer:

TRUE

Explanation:

Cache memory is a computer component that help to retrieve data from the computer's memory by acting as a temporary storage area where the computer's processor can retrieve data easily. The temporary storage area is known as cache and is more readily available to the processor than the computer's main memory source.

Although Cache memory is a smaller type of a computer memory that provides high-speed data access to a processor and stores which frequently used computer programs, applications and data.

Cache memory is used to reduce the average time to access data from the Main memory and they stores data so that future requests for that data can be served faster.

5 0
3 years ago
Password procedures, information encryption software, and firewalls are examples of measures taken to address:
Gnoma [55]
<span>Password procedures, information encryption software, and firewalls are examples of measures taken to address are all measures taken to safeguard information security and protect users data from being tampered or manipulated by invaders. 

In web, if we leave our information without encryption or if we leave our system without firewall, different types of security threats might arise: such as, information being hacked, manipulated or sent to wrong places. To avoid this information encryption is done. We might also need to firewall our system so that we can avoid unwanted access and invading of our privacy using malwares and other tools. </span>
5 0
3 years ago
Assuming that all of the table and column names are spelled correctly, what's wrong with the INSERT statement that follows?
Whitepunk [10]

Answer:

C. The number of items in the column list doesn't match the number in the VALUES list.

Explanation:

The INSERT INTO statement is used to insert new records in a table.

<u>Syntax is as follows:</u>

INSERT INTO table_name (column1, column2, column3, ...)

VALUES (value1, value2, value3, ...);

Each column item has to match with the values to be inserted in the same order.

In the question, there are 8 column items specified whereas there are only 7 values given to be inserted.

3 0
3 years ago
Printed versions of your presentation that contain the slides and blank lines below are called speakers notes
Vadim26 [7]

No, printed versions of your presentation that contain the slides and blank lines below are not called speakers notes.

Speakers notes are notes that are hidden within a PowerPoint presentation and allowing the speaker to refer back to them during the presentation.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Two or more computers that transfer information between computers are called a
    7·1 answer
  • Knowing the meaning of the acronym WYSIWYG can be most helpful to you when you
    14·1 answer
  • Steve wants to become a successful graphic design entrepreneur. Which entrepreneurial approach will help him succeed? A. working
    14·1 answer
  • What are some ways to accept data typed into a cell? Check all that apply.
    15·1 answer
  • What is the best reason to delete Internet browsing history on a regular basis? to solve a computer hardware problem to protect
    13·2 answers
  • In the view that follows, which field can't be updated create view example_2 as select invoice_number, invoice_date, invoice_tot
    13·1 answer
  • Write a program that reads a person's first and last names separated by a space, assuming the first and last names are both sing
    10·1 answer
  • 9.1.3: Printing vector elements with a for loop. Write a for loop to print all NUM_VALS elements of vector courseGrades, followi
    5·1 answer
  • Write a programme with C++ language wich print the biggest number in between three numbers , whith INT
    14·1 answer
  • At a red traffic light, you must stop__
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!