1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
TiliK225 [7]
2 years ago
5

Consider the following statements regarding computers:

Computers and Technology
1 answer:
Hoochie [10]2 years ago
7 0

Answer:

l ll and lll

Explanation:

because this are the only ones that are true

You might be interested in
You are considering using Wi-Fi triangulation to track the location of wireless devices within your organization. However, you h
earnstyle [38]

Answer:

Getting correct angle readings from each location.

Explanation:

Triangulation uses the angle of strongest signal from 3 locations to find their intersect points, but this means that if one of out 3+ readings is inaccurate, you would go on a wild goose chase.

3 0
3 years ago
How has social media influenced the marketing and PR activities of companies? Explain in what ways companies, individuals, and N
Lesechka [4]
Social Media has infuenced marketing for many years because the fact hat they can advertise on socal easily because people spend so much time on social media a day so yea!
3 0
3 years ago
What do i need to do to get microsoft certified?
kondaur [170]
Sign up for Gmetrix and Centriport (Console 8). THose two should explain the requirements. 

I took a class to get certified, which was Business Computer Applications, so if you're able to take that class, I suggest you do so.
6 0
3 years ago
Based on your understanding of Moore’s Law, what do you predict will be the next trend in the evolution of computers?
Alex

Answer:

based on he law um yeah idk btu other than that idk

Explanation:

7 0
3 years ago
Read 2 more answers
In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions thro
shusha [124]

Answer:

Split Infection

Explanation:

In the split infection technique, each time the file is opened either by the user or the system operating system, the virus copy itself into another file on the same system and unload malicious payloads to perform some actions. While this is ongoing, the virus erase file from the user hard drive and might even go as formatting the hard disk drive.

It should be noted that the virus cannot transfer itself from one computer to another

5 0
4 years ago
Other questions:
  • Define a function setheight, with int parameters feetval and inchesval, that returns a struct of type heightftin. the function s
    6·1 answer
  • Given an int variable n that has been initialized to a positive value and, in addition, int variables k and total that have alre
    8·2 answers
  • You are the manager and an employee shows up for his shift dressed inappropriately for work. What should you do?
    14·2 answers
  • Windows installer cannot install .exe files. to distribute a software package that installs with an .exe file, what must you do
    14·1 answer
  • Write a program that converts or calculates values. Use the following guidelines to write your program:
    8·1 answer
  • If your computer system is not working correctly, you can use System Restore to return the ___________ ____________ to an earlie
    10·1 answer
  • To find all the prime numbers less than or equal to a given integer n by Eratosthenes' method: 1. Create a list of consecutive i
    9·1 answer
  • Use the drop-down menus to match each description with the part of a report where it is located.
    10·1 answer
  • Trish has bought a new computer that she plans to start on after a week
    5·1 answer
  • What would be the code of this in HTML ??
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!