1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
3 years ago
13

Assignment 3: chabot​

Computers and Technology
1 answer:
Goryan [66]3 years ago
6 0

Answer:

question?

Explanation:

You might be interested in
How to drive more website traffic?
lidiya [134]

Hello there,

How to drive more website traffic?

Answer: Advertise

8 0
4 years ago
Which of the follow is the best technique to determine how many menu items are needed and how to structure the menus and sub men
AnnZ [28]

Answer:

c. ​Group use cases by actor.

Explanation:

A use case is used to describe interaction between systems and users to achieve a goal. Mostly, a list of possible interaction between the system and the user is identified. The user can be a single person or a group. By using use case, the requirement of a systems is identified from a users point of view.

8 0
3 years ago
Virtual Memory involves swapping between which 2 devices?
Darina [25.2K]

Answer:

Ram and the hard drive

Explanation:

A page of RAM is written to the harddisk and read back when it is needed again. That way it may seem you have more RAM than you actually have, at the cost of performance of course.

6 0
3 years ago
7. What considerations need to be made in the selection of a sheet size for a<br> drawing?
lions [1.4K]

Answer:

Standard US Engineering Drawing Sizes

Drawing Size Dimensions (millimeters) Dimensions (inches)

ANSI C 431.8 x 558.8 17 x 22

ANSI D 558.8 x 863.6 22 x 34

ANSI E 863.6 x 1117.6 34 x 44

Explanation:

3 0
3 years ago
Read 2 more answers
What is an operating system?<br> Please can you help me just give me a basic answer?
choli [55]

Answer:

An operating system is an organied collection of program that brings life to computer.

3 0
3 years ago
Other questions:
  • What is the recommended size for bulleted text? 12–22 24–40 44–66 54–80
    10·1 answer
  • One vital component of your professional behavior with regard to computing systems today is the creation of​ _________.
    14·1 answer
  • A(n) __________attack is designed to render the target unreachable by legitimate users, not to provide the attacker access to th
    8·1 answer
  • Which ipv6 prefix will the typical enterprise network receive from the service provider?
    12·1 answer
  • what tool can a student use to make sure his or her work paper does not take credit for someone else's work ?
    5·1 answer
  • What does core mean? what are they for?​
    5·1 answer
  • The IT department sent out a memo stating that it will start delivering desktop computer interfaces through the IT data center v
    5·1 answer
  • An important goal of biosecurity training is to: Prevent laboratory accidents that could expose personnel to hazardous agents. P
    13·1 answer
  • Can anyone help me with these assignments??? Hands On Assignments- Insertion of Symbols, Special Characters, and Images.... and
    9·1 answer
  • Does anyone know what episode Hinata threatens useless sakura?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!