1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
topjm [15]
3 years ago
13

Can u please answer this​

Computers and Technology
2 answers:
antoniya [11.8K]3 years ago
8 0

Answer to your question is given in the attachment

<h3>PLEASE MARK ME AS BRAINLIEST </h3>

I don't know the answer of 2 and 3

Sorry for that :(

Ivanshal [37]3 years ago
5 0

Answer:

this worksheet can be found online

Explanation:

You might be interested in
In a large organization, how do you typically request permission to perform a network change?
kherson [118]

<em>Network change in larger organization follows hierarchy of approval. </em>

<em>Hierarchy of approval will start from the lowest department. The lowest department must prepare a written proposal, stating that there is a need for the network upgrade. Attachments such as proposed price list for the new equipments to buy also comes up with the proposal. Once that all documents are prepared, signatures from approval departments must be gathered. Each signature should be present and complete. </em>

<em> </em>

<em />

3 0
3 years ago
On the Visit screen, you will not see one of the following:
san4es73 [151]

Answer:

The answer is "Option b".

Explanation:

An access level denotes a set of data type permissions or restrictions, that reduces the access level, which is an effective way to reduce failure modes, debug time and system complexity. and other options are not correct, i.e. define as follows:

  • In option a, In some of the cases, the system provides security, which is responded by the server to check the Eligibility of user, that's why it is not correct.
  • In option c, The home address is always shown on the URL, that's why it is not correct.

8 0
4 years ago
Why are user application configuration files saved in the user’s home directory and not under /etc with all the other system-wid
kodGreya [7K]

Explanation:

The main reason why is because regular users don't have permission to write to /etc. Assuming this is Linux, it is a multi-user operating system. Meaning if there are user-application configuration files within /etc, it would prevent users from being able to customize their applications.

6 0
4 years ago
Which of the following is considered a benefit when using slab allocator?
tatyana61 [14]

Answer:

Option(d) is the correct answer to the given question

Explanation:

The main advantage of slab allocator is that There is no memory is lost because of the fragmentation this is due to some driver data framework has a cache memory that is connected to it.

  • In the slab allocator the resources are repeatedly assigned or free to handle them. It is a type of memory management scheme that is used for distributing resources to the memory.
  • All the other options are not considered as advantages of Slab allocator that's why they are an incorrect options.
7 0
3 years ago
What allow you to write alphas on a computer keyboard
lions [1.4K]

Answer:

"To create any of these Greek letters using the Alt codes, simply press the "Alt" key while simultaneously typing the listed number. For example, to create the Greek letter Alpha (α), press the "Alt" key and type 224 using the keypad at the right side of your keyboard." - GOOGLE

5 0
3 years ago
Other questions:
  • Provide the code to insert a subtitle track named "Spanish Version" using the track text in the spanish.vtt file and the Spanish
    9·1 answer
  • Drivers must always yield to emergency vehicles traveling
    9·1 answer
  • Critical Infrastructure and Key Resources (CIKR) are potential terrorist targets. CIKR might include: Select one: 1. All telecom
    14·1 answer
  • What programming languages should a mathematician learn?
    6·1 answer
  • U2- an example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
    6·1 answer
  • your computer running Windows 10 is doing some very strange things with operating system you are fairly certain it is not a hard
    13·2 answers
  • All presentations should have this. A. a clear central message. B. a design template. C. at least seven slides. D. special effec
    10·2 answers
  • Question 1
    10·1 answer
  • This isn't academic, but what do I do if HI-REZ won't let me sign into an existing account. “Something went wrong” keeps popping
    5·1 answer
  • How can you create a messages to look like an IMessage?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!