1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sladkih [1.3K]
2 years ago
9

Please help!

Computers and Technology
1 answer:
34kurt2 years ago
7 0

Answer:

I don't know the exact fix to this because I don't know exactly what you're talking about, but I do suggest you instead just highlight with shift and the arrow keys to make it much simpler.

You might be interested in
State five differences between Dos and Windows.​
nalin [4]
1. DOS is single tasking OS. Windows is multi-tasking OS.

2. DOS consumes quite low power. Windows consumes high power.

3. DOS memory requirements are quite low. Windows memory requirements are quite high as compared to DOS.

4. DOS has no support for networking. Windows supports networking.

5. Multimedia is not supported in DOS. Windows supports multimedia likes games, videos, audios etc.
6 0
2 years ago
Which of the following domain types is most trustworthy 1) .com 2) .tv 3).org 4) .edu
yKpoI14uk [10]

Answer:

.edu

Explanation:

8 0
3 years ago
Read 2 more answers
A motorist is using the AHP to choose a new car from three possible models Arrow, a Bestmobile and a Commuter. The choice will a
Lynna [10]

Answer: i think the answer is A. Construct a hierarchy to represent the decision problem.

8 0
3 years ago
Read 2 more answers
A(n) _____ is a local connection point-of-presence that connects a variety of high-performance networks, and its main function i
kirza4 [7]

Answer:

GigaPOP

Explanation:

<em>A gigabit point of presence, also known as GigaPOP is a single entry point to Internet2, which is a high-speed IP network managed by institutions and other organizations. Gigabit Points of Presence generally handle data transmission rates of one gigabit per second or more.</em>

8 0
1 year ago
Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he se
postnew [5]

Answer:

Volatile memory analysis

Explanation:

volatile data analysis in a computer's memory dump memory forensics is used by information security specialists to examine and identify assaults or harmful actions that leave no clearly identifiable trails on hard disk data which os what Carl decides to preserve as much data as possible by capturing data in memory

6 0
2 years ago
Other questions:
  • What are the pros and cons of editorial anonymity in Wikipedia
    10·2 answers
  • 3. Assume a disk drive from the late 1990s is configured as follows. The total storage is approximately 675MB divided among 15 s
    11·1 answer
  • Which type of computing device is best suited to having a digital pen as an input device?
    9·1 answer
  • Write a while loop that adds the first 100 numbers (from 1 to 100) together. To do so, use a while loop that continues while the
    12·2 answers
  • When parallel parking, you should select a space that is __________ as long as your car.
    11·1 answer
  • How is the bootstrap program started?
    6·2 answers
  • Book information (overriding member methods) Given main() and a base Book class, define a derived class called Encyclopedia. Wit
    12·1 answer
  • If you need some one to talk to you can talk to me
    13·2 answers
  • Give me 4 examples of things to consider as a sound designer?<br> HURYYYYY IM TIMED
    11·1 answer
  • Office 365 ProPlus can be deployed to your enterprise. When doing so, which tool enables you to choose the language, hardware ar
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!