1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_tiger [21]
2 years ago
6

Please help I’ll give 10 points

Computers and Technology
1 answer:
yaroslaw [1]2 years ago
5 0

Answer: Do

Explanation:

You might be interested in
PLEASE HELP ME Jimmy and his friends are creating a rock band and have decided to turn his garage into a recording studio. He wa
Tems11 [23]

Answer:

D.  a studio monitor

Explanation:

A studio monitor is an electrical equipment that is used to enhance the quality of sound or music. It work like a speaker that can be used professionals to record audio songs, to make films and some other applications with good quality. It is usually used in studios where producer must ensures that the quality of music. As in music industry the quality of music depends on the quality of instrument used for the purpose of recording.

<em>This is the reason that, Jimmy and his friends should choose a Studio Monitor to achieve the most accurate sound quality.</em>

6 0
3 years ago
Laurel, the manager of a software company, assumes that the male employees in his organization are more creative and innovative
grandymaker [24]

Answer:

Sterotyping

Explanation:

A stereotype is an over-generalized perception or view about a particular category of individuals or group. It is a belief that people might have concerning each and every person of a particular group. The type of expectation can differ from people to people; it can be, for instance, a belief or perception about a particular group's personality, preferences, or ability.

5 0
3 years ago
Give two examples of safe, professional usernames. (1-2 sentences)
erastovalidia [21]

Answer:

Safe username

Explanation:

OKNGR$#1133

PLMOKNG^&*89

5 0
2 years ago
Topic: Graphs.1.) Bob loves foreign languages and wants to plan his courseschedule for the following years. He is interested in
saveliy_v [14]

Answer:

  LA15; LA22

LA16; LA31; LA32

  LA169; LA126;

  LA127; LA141

Explanation:

Given

Courses: LA15,\ LA16,\ LA22,\ LA31,\ LA32,\ LA126,\ LA127,\ LA141,\ LA 169.

Required

Course sequence to satisfy the prerequisite

From the course prerequisite, we have:

1.\ LA15 \to None    and    3.\ LA22 \to None

This means that LA15 and LA22 are the base courses, and they have no prerequisite. So, we have:

[LA15; LA22]

LA16 and LA31 have LA15 as their direct course prerequisite. So, the sequence becomes

[LA15 \to [LA16, LA31]; LA22]

To complete the sequence, we read each course and place them other their prerequisite.

<em>See attachment for complete tree</em>

<em></em>

From the tree, we have the sequence to be:

<em>LA15; LA22</em>

<em>LA16; LA31; LA32</em>

<em>LA169; LA126;</em>

<em>LA127; LA141</em>

<em />

5 0
2 years ago
Describe five ways in which Process Explorer (procexp) can be used in computer forensics as part of an investigation
nataly862011 [7]

Answer:

 The process explorer is mainly used for tracking the actual problems in the system. Process explorer is also known as proc-exp and it is also used as system monitoring where it monitor the microsoft window that are typically created by the SysInternals.  

The following are the five ways in which the proc-exp (Process explorer) are used in the computer forensics for the purpose of investigation are:

  • The process explorer mainly provide the various types of functionality to the task manager for monitoring the system properly.
  • It basically used in the system for tracking the main problems.
  • It used in computer forensics for tracking the system problems and it give the detail information about the system memory also.
  • It keeps track all the virus and malicious software in the computer system.
  • It helps for investigation purpose as by using the process explorer we can get all the information about the particular computer system and software.  

4 0
3 years ago
Other questions:
  • What effect can camera tilt create? Do you think this is effective? Why or why not?
    13·1 answer
  • 1. Write a function that will ask the user to enter a value in dollars. The function should calculate and display the equivalent
    9·1 answer
  • Which of the following are part of personal growth? Check all of the boxes that apply.
    8·2 answers
  • Ask the user for a total food bill and then find the new total after 6% tax and a tip of the users choice (15, 18, 20%) in pytho
    8·1 answer
  • What are the differences between tkinter toolkit and PyQt?
    14·1 answer
  • For safety, the lights on your vehicle must be in good working condition. Which statement about
    8·2 answers
  • In an URL what does the domain name describe?
    14·1 answer
  • Help me!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!​
    9·1 answer
  • Please help me in this question​
    7·2 answers
  • What do we call the software program that handles the communication between a peripheral device and your computer?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!