That's Go.ogle.
Two famous web browsers present are
Ch romeMo zila Firefox.Chr ome is known for efficiency and lots of ad shuttering + surfing through higher data usage and heavy n et traffic.
Where as Fire fox is comparatively faster , privacy at peak and surfing through compartively lower dat a usage
Answer:
go..ogle & Micr...osoft ed;.ge
Explanation:
i use go..ogle because its the default search engine so its already there unlike micr...osoft ed;.ge......
If you are interested in an occupation as an operating system administrator or software engineer, you also may benefit from certifications in networking, hardware, and the Internet. Group of answer choices True False
True
Explanation:
because in that field there are many things you need to learn and that includes mostly all of them, as an Operating system administrator you most likely need to know things revolving around the system such as the compatibility with the Hardware. And as an Software engineer you NEED to know if your software is even compatible with the new technologys or if there are any problems, the same goes to networking
feel free to correct me
Help ASAP this Answer is simple…
why is fair use important
Answer:
to ensure that the rights of the copyright holders are fair or balanced properly
Explanation:
hope this helps
CODEHS: WHY is it important to know the difference between div and span?
Span and div are both generic HTML elements that group together related parts of a web page. However, they serve different functions. A div element is used for block-level organization and styling of page elements, whereas a span element is used for inline organization and styling.
Which of these would you least expect to find at an fbla-pbl meeting?
planning a community service project
role-playing to develop leadership skills
students working on iste certification
working with local business leaders
role-playing to develop leadership skills
One sign of a virus infection is that available memory is less than what should be available. Group of answer choices True False
Answer:
[tex]True.[/tex]
Complete the sentences.
The ACCUPLACER exam is a diagnostic test that evaluates the students’ progress in a specific academic field. It is divided into sections that assess reading, writing, and mathematics skills. The
section tests students’ ability to solve problems related to algebra, trigonometry, and geometry. The
section tests how well the students can write. The
section tests the students’ knowledge about sentence structure.
Answer:
fiances
Explanations it just is
When you collaborate or meet with a person or group online, it is called
1. cloud computing
2. social networking
3. text messaging
4.web conferencing
When you collaborate or meet with a person or group online, it is called social networking.
What is social networking?The term social networking is known to be the act of meeting people online, interacting with them and even making friendship with them.
Therefore, When you collaborate or meet with a person or group online, it is called social networking.
Learn more about social networking from
https://brainly.com/question/1027666
#SPJ1
Android os is developed by
Answer:
It is developed by G oogle
Explanation:
Android os is developed by G oogle. It launched in 2008.
John is using a spreadsheet program. He needs to select two cells that are non-adjacent to one another. He is currently holding down the "Shift" key while clicking on the two cells. Interpret John's mistake.
John is using a right click when he should be using a left click
John should be holding the "Alt" key instead of the "Shift" key
John is not making any mistakes
John should be holding the "Ctrl" key instead of the "Shift" key
Answer:
John should be holding down the "Ctrl" key instead of the "Shift" key.
Explanation:
"Ctrl" key must be held down when selecting multiple cells, not "Shift" key.
Hope this helps!
Answer:
John should be holding the "Ctrl" key instead of the "Shift" key
Explanation:
When should a user consider restoring the operating system.
A user can consider restoring the operating system if the programs or apps do not start properly or when they are hanging/freezing.
What is an operating system?This is known to be a software that aids a computer's basic functions, such as working on tasks and others.
Note that A user can consider restoring the operating system if the programs or apps do not start properly or when they are hanging/freezing.
Learn more about operating system from
https://brainly.com/question/22811693
#SPJ1
Enumerate at least 5 furnitures you would add to your house which would be practical and energy-saving.
Answer:1. Advanced house framing
Advanced house framing, also known as optimum value engineering, is a specific framing technique wherein a house is constructed using less lumber and waste. Advanced house framing saves energy by using less wood and more insulation. According to the U.S. Department of Energy, using advanced framing can lower material costs by $500 to $1,000 for a 1,200- to 2,400-square-foot house. It can also cut labor costs by 3-5% and annual heating and cooling costs by up to 5%.
2. Cool roofs
Cool roofs are designed to reflect sunlight and lower roofing temperatures. Cool roofs are made from a type of reflective material within roofing materials such as tiles, shingles, paint or other substances. This energy-saving technique is ideal for houses in warm climates where air conditioning costs are high all year around.
3. The right exterior doors
Choosing the right exterior door for a home should be a carefully thought-out decision. When you choose a door, you should first consider the doors' energy-performance ratings. This score lets you know how well each door does in preserving the energy in your home by trapping heat or cool air inside. Using this score to help you find the ideal door will also help you narrow down your selection and find an exterior door that best matches your taste, needs and wants.
4. Skylights
Skylights are often a feature that enters homeowners' mind when they think of improving their homes' energy efficiency. Skylights have many benefits, which makes them ideal for any home. Skylights improve houses' heating, lighting and ventilation. It is important to note that if you are considering placing skylights in your home, the U.S. Department of Energy recommends they be no larger than 5% of the floor area in rooms with several windows, and 15% of the floor area in rooms with minimal windows.
5. Window treatments
Boring curtains do more than drive your spouse crazy; they can actually help reduce energy costs in your home. By being specific in your choice of window treatments, you can reduce heat loss or keep cool air inside your home. Many factors determine window treatments' energy efficiency. For example, the type of material and color of the treatment are significant, along with how it opens and closes.
Explanation:
What could cause an external drive, like a usb flash drive, to not be recognized when plugged into a computer?.
The reasons for a flash drive being not recognized when plugged in are the drive can be corrupt or broken, the port of the computer may be broken.
What is a USB flash drive?A USB flash drive is a drive is a small device that connect devices with computer or insert data to the computer.
A USB have capacity to hold data within, and the data can be transported to anywhere.
Thus, the reasons for a flash drive being not recognized when plugged in are the drive can be corrupt or broken, the port of the computer may be broken.
Learn more about USB flash drive
https://brainly.com/question/14144068
#SPJ1
analog computer are general purpose computer true or false
Answer:
false
Explanation:
Analog computers were widely used in scientific and industrial applications even after the advent of digital computers
Which automatic startup option should you choose when windows' startup fails immediately after installing a new driver but before you have logged on again
Answer:
last known good configuration
Explanation:
If you're having difficulties starting Windows, the Last Known Good Configuration, or LKGC for short, is a technique to get it started. It loads the drivers and registry data from the last time you began and shut down your computer successfully.
10.13 lab 10c: output range with increment of 5 write a program whose input is two integers. output the first integer and subsequent increments of 5 as long as the value is less than or equal to the second integer. you may prompt for the two integers as you wish; the prompt will not be included in the grading. ex: if the input is:
he program gives an output in increment of 5, if the first inputted integer is less than the second. The program written in python 3 goes thus
If “A” represents in binary 10011001, what will be the value of word “CAB”?
Answer:
01000011 01000001 01000010
Explanation:
You can convert to and from binary and the base-10 system typically used by humans. You can also convert to and from binary and hexadecimal where you need four digits of binary to represent one digit of hex. Converting to and from binary and octal is another possibility. It takes three binary digits to represent an octal digit. Binary 000 is octal digit 0.
Stories used to be told only by:
OA. digitally recording them.
OB. saying them aloud.
OC. writing them down.
OD. drawing them on paper.
Answer:
OB. saying them aloud.
Explanation:
In the olden days, materials like recording devices, pens or paper weren't invented, so people had to know stories by heart.
Given a sorted list of integers, output the middle integer. assume the number of integers is always odd.
ex: if the input is:
2 3 4 8 11 -1
(a negative indicates the end), the output is:
4
the maximum number of inputs for any test case should not exceed 9. if exceeded, output "too many inputs".
hint: first read the data into a vector. then, based on the number of items, find the middle item.
#include
#include // must include vector library to use vectors
using namespace std;
int main() {
/* type your code here. */
return 0;
}
integer userInput
integer i
integer mid
integer array(20) number
userInput = 1
for i = 0; userInput >= 0; i = i + 1
if number[i] > -1
userInput = Get next input
number[i] = userInput
i = i - 1
mid = i / 2
if i > 9
Put "Too many inputs" to output
elseif i % 2 == 0
Put number[mid - 1] to output
else
Put number[mid] to output
An employee at a large global firm is sending a document with sensitive information to a co-worker in another country. how should the contents of the document be protected?
The employee at a large global firm which is sending a document with sensitive information to a co-worker in another country can document the data with end-to-end encryption.
How document be protected?
There are many ways a computer file can be protected. The ways to protect the document are,
Using the cloud based secure file sharing sites.The protected view can be used to secure the contents of the document sending to another country.When the file is end-to-end encrypted between the employee and co worker, then no one can be seen the file in between.Thus, the employee at a large global firm which is sending a document with sensitive information to a co-worker in another country can document the data end-to-end encryption.
Learn more about the data protection here;
https://brainly.com/question/4219149
#SPJ2
Carrie needs to keep a budget for her department. Each employee in her department sends her travel expenses. In cell, C2, C3, C4, and C5, she enters the total of each employee’s expenses. In cell B1, she enters the original amount of money the department was allotted for spending. What formula should she use to calculate the amount of money the department currently has?
=B1 -(C2+C3+C4+C5)
=B1-C2+ B1-C3+B1-C4+B1-C5
= (C2+C3+C4+C5)-B1
=(B1+C2+C3+C4+C5)
Answer:
(C2+C3+C4+C5)-B1
Explanation:
Answer:
=(C2+C3+C4+C5)/4
Explanation:
add all numbers together then div. by the total amount of numbers is how you get the average.
what are trends in GPS ?
Answer:
New Trends in GPS & Telematics in 2021 and Beyond - Rewire Security. Real-time location tracking systems for cars, vans, motorcycles, lorries, wired or plug & play options—battery-powered GPS tracking systems with magnets attached to flat metal surfaces such as containers.
Explanation:
What initialization vector (IV) do most weak implementations of the Wireless Equivalency Protocol (WEP) use
24 bits is an initialization vector (IV) which is used by most weak implementations of the Wireless Equivalency Protocol (WEP).
What is Wireless Equivalency Protocol (WEP)?Wireless Equivalency Protocol (WEP) can be defined as a standard wireless protocol that is designed and developed to provide a significant level of security and privacy on 802.11b wireless local area network (WLAN).
According to the IEEE Wireless Fidelity (Wi-Fi) standard, 24 bits is an initialization vector (IV) which is used by most weak implementations of the Wireless Equivalency Protocol (WEP).
Read more on Wireless Equivalency Protocol here: https://brainly.com/question/13697151
#SPJ1
Which best describes how information is sent on the internet?
Answer:
a. The information is first sent via a Broadband for efficient transmission, and if not successful, only then it is resent via a Baseband that exists as a backup network as packets b. The message is first broken down into small packets before being sent, then they are
Explanation:
What are the real-life applications of coding? any smart person who can give this ans
Answer:
Coding is used for a ton of different things. It can be used to create websites, video games, and apps. It is also an essential part of artificial intelligence and machine learning. Coding is a way to create computer programs that have a sequence of instructions for the computer to execute.
Explanation:
A series of events that gets the computer ready for work is known as what?
soft boot
hard boot
boot loader
boot sequence
Answer:
Boot Sequence
Explanation:
Help me with this question asap please :)
Answer:
I think it's sequence as there is a pattern of connection in the words
Compare and contrast sources and types of credit, including costs and benefits of installment
credit, collateralized loans versus unsecured credit, credit cards, mortgages, auto loans, and
student loans.
Answer:
loan your mom
Explanation:
You are responsible for managing an internal FTP server. A user reports that files available on the server yesterday are no longer available. Where can you look to determine what happened to the missing files
To determine what happened to the missing files are file Transfer Protocol (FTP) access logs list file activity on FTP servers, including file deletions or renames.
What is a FTP server?FTP is a File transfer protocol. It is a transfer of files from the client and the server on a computer network.
It is a basic thing in transferring or sharing files between two computer networks.
Thus, To determine what happened to the missing files are file Transfer Protocol (FTP) access logs list file activity on FTP servers, including file deletions or renames.
Learn more about FTP server
https://brainly.com/question/27610307
#SPJ1
you want to be able to restrict values allowed in a cell and need to create a drop-down list of values from which users can choose. which feature should you use?
The feature to restrict values allowed in a cell and need to create a drop-down list of values from which users can choose in the above scenario is data validation.
What is data validation?Data validation is a term that connote the act of monitoring the truthfulness and quality of source data before one can make use of it, importing or even process data with it.
Note that The feature to restrict values allowed in a cell and need to create a drop-down list of values from which users can choose in the above scenario is data validation as it ensure that users can make their own choice.
Learn more about data validation from
https://brainly.com/question/27138101
#SPJ1
what word makes this inappropriate????