1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WINSTONCH [101]
3 years ago
14

a ____ is a window inside the word window that can remain open and visible while you work in a document.

Computers and Technology
1 answer:
kykrilka [37]3 years ago
3 0

Answer:

Task Pane

Explanation:

You might be interested in
CompX Inc. is an online retailer of electronic products, including laptops and tablets. The company is known for its unique appr
Dafna1 [17]

Answer:

Differentiation

Explanation:

Differentiation is a business strategy used by organizations for gaining a competitive edge over competitors in the market.

During this approach, the organizations/business introduces a special strategy which goal is to differentiate their product or service in a positive way, from other products that are alike.

In this scenario the organization(CompX Inc) is offering a superior customer support.

6 0
3 years ago
Isabella's manager has asked her to write up a _____ that describes their company's interest in developing a custom software sol
kakasveta [241]

Answer:

Request for information (RFI)

Explanation:

Request for Information is a business process document that contains information about an organization's capability to deliver solutions to a potential client. The RFI document will contain information that will help for decision making by clients. Other similar business documents in this line are Request for tender (RFT), request for quotation (RFQ).

6 0
3 years ago
What is the technological singularity and what are the dangers it brings to man
professor190 [17]
The definition according to google and the dictionary of technological singularity is the following : The technological singularity (also, simply, the singularity) is the hypothesis that the invention of artificial superintelligence will abruptly trigger runaway technological growth, resulting in unfathomable changes to human civilization.

The dangers this brings to man kind is the fact that people will turn out to not be people or there may be a different species considered as humans or human kind .Also we were made as humans from something else artificial super intelligence will basically be forming from us which means it will be forming from something that was already mean basically meaning there will be something changed within the species or artificial super intelligence itself.
3 0
3 years ago
The ability for a protocol or program to determine that something went wrong is known as_________.
777dan777 [17]

Answer:

The correct answer to the following question will be Error-detection.

Explanation:

Error-detection: The detection of errors caused during the transmission from the transmitter to the receiver by damage and other noises, known as Error-detection. This error-detection has the ability to resolute if something went wrong and if any error occurs in the program.

There are mainly three types of error-detection, these types can be followed:

  • Automatic Repeat Request (ARQ)
  • Forward Error Correction
  • Hybrid Schemes

There are two methods for error-detection, such as:

  • Single parity check
  • Two-dimensional parity check

4 0
3 years ago
Implement A* graph search. A* takes a heuristic function as an argument. Heuristics
svetlana [45]
It may be the reason
7 0
3 years ago
Other questions:
  • Write a Tip Calculator in code in VMware Fusion
    13·1 answer
  • What can you do with someone's ip address?
    9·1 answer
  • All but one of the following statements about stored procedures is true. Which one is false? a. They consist of one or more SQL
    10·1 answer
  • A proprietary operating system designed for mobile devices, with associated libraries, user interface, frameworks and reference
    9·1 answer
  • In JAVA,
    10·1 answer
  • ​if a primary key combines two or more fields, then it is called a _____.
    14·1 answer
  • A user's computer will not boot. A technician notices four indicator lights on the backside of the
    8·1 answer
  • Where do i put the lines?
    11·1 answer
  • List the difference between GIGO and bug ​
    15·1 answer
  • Artificial intelligence (AI) and machine learning are especially important during which security information and event managemen
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!