Answers

Answer 1

Answer:

option 1 is correct go with 1s .


Related Questions

Son las características de la topología anillo *
5 puntos
Opción 1 Todas las terminales son inteligentes.
Opción 2 Todas las terminales son brutas.
Opción 3 Todas las terminales almacenan.

Answers

The 3rd onee i think if not 4th

Draw a logic gate circuit for each of the following Boolean expressions.
1- F= AB’
2-F = A’ + (B*C)
3-F= (A*B) + (A*C)

Answers

Answer:

can you explain more please I didn't understand

You use a Windows desktop system to edit and produce audio files. Your system has two hard disks installed. Your applications are installed on the C: volume on the first hard disk. Because of the size of the audio files you produce, you keep them on a separate volume (D:) located on the second hard disk. Your Windows desktop system has system protection enabled on the both drives. You need to configure system protection on this system to maximize overall protection. What should you do

Answers

Answer:

You can go to the windows group policy settings and turn the security mode to thw highest or just installing a AV system that has a good reputation.

Hope this help please give the brainliest award would be much appreciated.

how can an attacker execute malware through a script?

Answers

Answer:

An attacker can attach a script to a program that you download which then infects your computer.

Hey is anyone else getting this? Don't mind the answer.

Answers

Answer:

Getting what? I don't get what you mean.

Maybe the dog is in heaven…therefore it’s infinity miles while the other has a certain number of miles because it is alive and on the earth..??


Not 100% sure but I think that’s why.

What component uses thermal paste to attach the heat sink?

Answers

Answer:

Thermal compound is the answer

what is output if the user types 13 click all that apply ABCD

Answers

Answer:

AD?

Explanation:

Answer:

A C D

Explanation:

youre welcome :)

Which options are available in the Conditional Formatting dialog box?

Answers

Answer:

all but b are correct.

Explanation:

what is the problem here

Answers

Answer:

I think ...............

Deleting messages keeps them in the mailbox and on the server. How can they be removed from the server to reduce the quota?

Answers

Answer:

Left-click each message, and move it to the Trash folder.

Right-click the Deleted Items folder, and click Empty Folder.

Click the Folder tab, and click the Empty Folder in Clean Up group.

Right-click the Deleted Items folder, and click Mark All as Read.

whenever I try to make an account it says it can't sign me up at this time or something- can you help?-

Answers

Answer:

You can try emailing tech support and describing your issue. In order to get the best help as quickly as possible, try providing screenshots of what happens when you sign in or describe everything you see on the screen when the problem occurs, and quote error messages directly when possible.

what is the difference between internal and external css?

Answers

Answer:

Internal CSS are the ones that we can write within the same file i.e the HTML code and CSS code are placed in the same file.

External CSS is that we can write in a separate file than the HTML code i.e the HTML file is separate like(index.html) the CSS file is separate like(style.css).

Explanation:

You have just received a new laptop that you will use on your company network and at home. The company network uses dynamic addressing, and your home network uses static addressing. When you connect the laptop to the company network, everything works fine. When you take your laptop home, you cannot connect to devices on your home network or to the internet.

Required:
What could have been the reason for that?

Answers

Answer:

The network address can be the reason. You need to modify it so you can have access.

What is word in computer?

Answers

Answer:

In computing, a word is the natural unit of data used by a particular processor design. A word is a fixed-sized piece of data handled as a unit by the instruction set or the hardware of the processor.

This the answer you wanted? (brainliest?)

which are types of gradients to choose from when working in photoshop

Answers

Answer:

can anyone help me in computer

There are regulations in many nations requiring CUD-compliant graphics in public areas or colour vision deficit. Photoshop has two blindness settings: Protanopia-type (red-blindness) and Deuteranopia-type (green-blindness).

How might colour blindness be utilised in Photoshop?

Click See Proof Setup Color Blindness Protanopia-type/Color Blindness Deuteranopia-type to use it. Now, you can toggle it on and off simply using the Ctrl+Y key on a PC or the +Y key on a Mac.

To help with design, there are certain tools that imitate colour blindness. Change the document's colour mode to RGB (this mode provides the most accurate proofs for colour blindness) Select either Protanopia-type or Deuteranopia-type under View > Proof Setting > Color Blindness.

Therefore, There are regulations in many nations requiring CUD-compliant graphics in public areas or colour vision deficit. Photoshop has two blindness settings: Protanopia-type (red-blindness) and Deuteranopia-type (green-blindness).

To know more about Photoshop visit:-

brainly.com/question/30808560

#SPJ2

what is the name of the method of problem solving that breaks a problem imto smaller problems​

Answers

Answer:

The first thing that came to mind was when my parents tell me "Take it one step at a time" I hope this helps

Explanation:

A document used to convince a panel of potential funders to help a product, programor service become reality.

Answers

Answer:

Concept paper

Explanation:

Preset headers and footers cannot have additional information add to the areas.
Group of answer choices

True

False

Answers

the answer to the question is true

what information most likely presents a security risk on your personal

Answers

An information which most likely presents a security risk on your personal social networking profile is: personal e-mail address or password.

A social networking profile can be defined as a database that contains information about the social characteristics and some personal details of an individual on social media websites.

Some of the social characteristics and details of an individual that are shared on social media websites include the following:

Date of birth.Occupation.Religion.Gender (sex).Location.Friends.

However, you should not share your personal e-mail address or password on any social media websites because with such information your social media account can be accessed by an attacker or a hacker.

In conclusion, personal e-mail address or password is a sensitive information that must never be shared on a social media website in order to avoid compromising the safety or security of your personal social networking profile.

Read more: https://brainly.com/question/21765376

3.5.7: Rectangle, Part 2 its python coding

Answers

The program which calculates the area of a rectangle written in python 3 is given thus :

def calc_area_rectangle(length, width):

#initialize a function named calc_area_rectangle which takes in two arguments

area= length * width

#the products of the arguments which are the length and width of value of the rectangle is assigned to the variable named area

return round(area, 2)

#the function returns the value of area rounded to 2 decimal places.

print(calc_area_rectangle(10, 20))

#sample run of the program

Learn more :https://brainly.com/question/25162828

how to get into someones phone without knowing the password iphone

Answers

Answer:

you should not do that unless you have a good reason to.

where is the scroll bar located inside a web browser?

Answers

The Scroll Bar is the narrow space in your browser window just to the right of the content area.

Scroll bar is located on the right hand side of the screen edg 2025

Order the steps to creating a new rule to handle meeting request responses in Outlook

Answers

Answer:

posting this. your photo order is correct.

Explanation:

unable to find valid certification path to requested target

Answers

Answer:

Explanation:

This issue might arise if you are using a self-signed certificate or a certificate that's been issued by an internal certificate authority, or if your clients (e.g., browser, Java) are outdated. Trust is handled by having the root and intermediate certificates of your SSL certificate on a trusted keystore.

pasagot po pls
tle-6​

Answers

Of art check TV ex ex hvubib if tff do

one Q what will be the answer?

Answers

Answer: a computer system that has one function within a large system

Explanation:

the key word here is EMBEDDED which means WITHIN SOMETHING ELSE

is a technique for breaking a problem down into smaller, less complex parts.



A- Pattern recognition
B- Decomposition

Answers

Decomposition hope this helps :)

Answer:

B) decomposition

Explanation:

I got it right on the test

1. Define the term M.A.N.

Answers

He is right I got it correct Thanks:)

What is the maximum number of guesses it will take to find a number
between 1 and 64?

Answers

Answer:

10?

Explanation:

what does it mean to clear a setting in a dialog box?

Answers

Answer:

to delete it

Explanation:

Other Questions
what is -2 2/5 + (-1 3/4) PLZZZZZZZZZ HELPPPPPPPPPPPPP Please solve the math problem... I will mark you brainliest anyone please help me who is the killer in i know what you did last summer Interest receivableA. Expense B. Asset C. Owners equity D. Revenue When Bernice comes out of the barbershop with the new hairdo what is the generalreaction of everyone? What is the red-circled part of this magazine cover known as? Which part of the compound microscope helps in gathering and focusing light rays on the specimen to be viewed Xander goes to the movies with his family. Each family member buys a ticket and two boxes of popcorn. If there are five member of his family, let t represent thecost of a ticket and p represent the cost of a box of popcorn. Write two different expressions that represent the total amount his family spent. Explain how each expressions describes the situation in a different way. A side of a square is 10 cm longer than the side of an equilateral triangle. The perimeter of the square is 3 times the perimeter of the triangle. Select the equation that represents the scenario when x represents the side of the triangle. PLEASE HELP! Im almost finished with this assignment if someone could answer these questions correctly Ill give you Brainliest for saving me haha! c. When a rational and an irrational number are added, is the sum rational or irrational?Explain.Type your response here:d. When a nonzero rational and an irrational number are multiplied, is the product rational orirrational? Explain.Type your response here:e. Which system of numbers is most similar to the system of polynomials?Type your response here:f. For each of the operationsaddition, subtraction, multiplication, and divisiondeterminewhether the set of polynomials of order 0 or 1 is closed or not closed. Consider any twopolynomials of degree 0 or 1.Type your response here: Lansing, Michigan is an example of what type of noun? Question 3 options: Common Proper 3 out of 100 is what percentage?A 3%B 30%C 18%D 100% A reader using context clues How would you analyze this quote from Shakespeare's Romeo and Juliet?:"Prodigious birth of love is it to meThat I must love a loathed enemy" r.3. How are elements on the periodic tablearranged? sc.8.P.8.6A atomic massB atomic number chemical symbolD state of matterno Pls help!! Its rlly important. I would PREFFER A LINK to WORD OR POWERPOINT ONLY. thanks! :) 50 pts03.02 Lesson Summary and AssessmentWhat Do I Have to Do?The Aztecs were a fierce and powerful culture in ancient times. They made many important strides in art, religion, and medicine as a thriving culture. Their economic tribute system helped to support military operations. The tributes also helped rulers and leaders to stay wealthy. However, the Aztec empire did not last forever. The empire fell in the early part of the 16th century.Task: You will create a storybook about the origin, growth, and fall of the ancient Aztec culture. The storybook will have five sections and should be written like you are telling a story from start to finish. It is up to you to decide what five aspects of Aztec history you will present in your story. However, it is important that you remember to tell about the origin, growth, and fall of the Aztecs. Each section of the story must also have an image that goes along with it.Audience: Imagine that you are making this book to read to a group of fourth graders and the goal of the book is to teach them about the rise and the fall of the Aztecs.Requirements:Your storybook must have five sections. Each section should explain a unique part of the Aztec story.Your storybook must specifically tell about their origins, how the civilization expanded, and what factors led to their collapse.On each page should be the text of the story along with an image that goes along with the story. Gii phng trnh ma trn AX=BA=[tex]\left[\begin{array}{ccc}1&2&3\\-2&-5&-3\\1&0&8\end{array}\right][/tex]B=[tex]\left[\begin{array}{ccc}-4&2&7\\3&5&-1\\3&-4&2\end{array}\right][/tex] how many electrons must beryllium gain or lose to form stable ions