1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Norma-Jean [14]
3 years ago
7

I need help right away pleas! 30 points.

Computers and Technology
1 answer:
Stolb23 [73]3 years ago
8 0

Answer:

I'm very sorry if I'm wrong but I think it's A

You might be interested in
Which of the following is the fastest processor
Nookie1986 [14]
Usually a Xeon is the fastest. Matters what time it was built and the chipset. If its old, the i7 is faster.
6 0
3 years ago
What command embeds a new spreadsheet object at the insertion point?
Debora [2.8K]
The correct answer is A. Table Object > Excel Spreadsheet

 

To be more precise- Click on INSERT on the ribbon tab in Microsoft Office. You will see a button labeled OBJECT. You can then scroll down and pick Excel Spreadsheet in the drop down menu.


6 0
3 years ago
Read 2 more answers
With the cold winter months fast approaching, Lungi wants to improve the overall effectiveness of operations at his NGO. He want
igor_vitrenko [27]
There would not be enough blankets
5 0
2 years ago
What are the consequences of having unprotected Linux operating systems installed on embedded systems?
Gennadij [26K]

Answer:

highly venerable to external attacks

Explanation:

Embedded systems are the type of computer systems that are specially designed having hardware and software components plus programmable  capabilities embedded into the hardware itself.

These computer systems are motorized by dedicated computer hardware chips made by companies such as Broadcom, Qualcomm, and Marvell. These chips are cheap which also means that they’re highly vulnerable, and the profit margins slim. They normally put a version of the Linux operating system onto the chips, lumping it up with some other bunch of open-source and proprietary components and drivers. With little or no technical engineering work before shipping, and there's little enticement to update their "board support package" until there’s probably a very good reason for it.

6 0
3 years ago
The opening of the throttle plate can be delayed as long as
blsea [12.9K]
<h2>I'm trying to adjust the sawtooth throttle on my H. I can open the throttle to 8 notches from the top and it is at the 1815 rated rpm. When I go above that it will overspeed, up to 2500rpm! At the last notch on the quadrant. I have tried the adjustments in the governor, the only thing I have been able to do is set the high rpm screw so it stops at the 8th notch from the top. I should be able to have full use of the quadrant and not go over the 1815 rpm, right? Does anyone have a pic of the throttle linkage under the hood and how to adjust it? I've also tried adjusting the rod in the governor between it and the carb, it is tightened all the way up now. Any ideas what I am missing?</h2>
6 0
3 years ago
Other questions:
  • How do you increase the amount of data in a sampled Google Analytics report?
    8·1 answer
  • ________ work(s) by using radio waves to communicate with radio antennas placed within adjacent geographic areas.
    8·1 answer
  • The publisher tab in the application control allows you to manage the various certificates that are used to do what to binaries?
    8·1 answer
  • Sharing a workbook helps to complete ________ (A, tasks) (B,changes) (C, typing) on time. Multiple people acssessing the workboo
    9·1 answer
  • What is the theory of trouble shooting
    10·2 answers
  • You can count on everything online to be 100% accurate. <br> A. FALSE <br> B. TRUE
    11·2 answers
  • How does computer applications affect our lives daily? 1- paragraph (4 sentences)
    8·2 answers
  • Select the four bad password ideas.
    13·2 answers
  • What are the methods of gilding<br><br>nonsense will be immediately reported. ​
    7·1 answer
  • An IT company has a HealthCare application with data security requirements such that the encryption key must be stored in a cust
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!