what is the answer ?????​

What Is The Answer ?????

Answers

Answer 1

Answer:

1) Driver or option D

2) Kindle or option C


Related Questions

What is word in computer?

Answers

Answer:

In computing, a word is the natural unit of data used by a particular processor design. A word is a fixed-sized piece of data handled as a unit by the instruction set or the hardware of the processor.

This the answer you wanted? (brainliest?)

Convert the denary number 44801 into hexadecimal

Answers

Numbers can be converted between bases.

The equivalent of 44801 in hexadecimal is: AF01

Denary numbers are simply base 10 numbers, while hexadecimal numbers are base 16 numbers

To convert from base 10 to base 16, we make use of division method (and we keep track of the remainders)

We keep dividing by 16, until we can no longer divide the numbers.

So, we have:

[tex]\mathbf{ 44801 \div 16 = 2800\ R\ 1}[/tex]

[tex]\mathbf{ 2800 \div 16 = 175\ R\ 0}[/tex]

[tex]\mathbf{ 175 \div 16 = 10\ R\ 15}[/tex]

[tex]\mathbf{ 10 \div 16 = 0\ R\ 10}[/tex]

Write out the remainders from bottom to top

(10) (15) 0 1

10 in hexadecimal is A15 in hexadecimal is F

So, the number becomes: AF01

Hence, the equivalent of 44801 in hexadecimal is: AF01

Read more about number conversions at:

https://brainly.com/question/2824068

fields where computers are used include: business, education, banking, government, true or false​

Answers

Answer:

True. Most businesses use computers, including all 4 mentioned in your questions.

computer ________ involves identifying, extracting, preserving, and documenting computer evidence.

Answers

computer forensics is the answer

You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack.
As a first responder, which of the following is the next BEST step to perform?
A. Prevent such an incident from occurring again.
B. Investigate how the attack occurred.
C. Contain the problem.
D. Hire a forensic team to gather evidence.

Answers

Answer:

First you need to investigate how the attack occurred, because if you don't know the root cause how are you going to prevent it from happening again.

Hope this help please give the brainliest award.

What is the maximum number of guesses it will take to find a number
between 1 and 64?

Answers

Answer:

10?

Explanation:

which data type consumes the least storage space?
text
OLE object
yes/no
memo​

Answers

Answer:

yes/no

Explanation:

Since yes /no has a storage of only 1 bit. Text max. 250 characters, memo 65,535 characters, OLE object 4G.B.

which device allows you to convert sounds into digital format to be used on the computer​

Answers

the correct anwser is ADC

What is the unique name given to a class called?

Answers

Answer:

A class is an extensible program-code template for creating objects.

Source: https://en.wikipedia.org/wiki/Class_(computer_programming)

,  Hope this helps:)

Have a great day!!

Look around at your current surroundings. What type of light is present? If someone were to take a photo of you from the front, what type of lighting would be present in the image? Evaluate and describe the type of lighting in your present surroundings and the various types of lighting that would be present if someone were to take your photo right now.

Answers

Answer:

White light

Explanation:

The lights are white in the classroom

Answer: Personally, I have many lights throughout my bedroom, but the main focus being the one in the center, up top. This light brings a yellowish tone throughout the room and is very bright. My window is blocked off from a blackout curtain, so there is no natural light. And, my LED lights spread throughout the top of my room, bringing a red tone to the left side, but not nearly as present as my center lighting.

Explanation: kinda specific answer i submitted

What refers to the place you drag and drop blocks to create instructions in Scratch?

A.
playground

B.
sprite

C.
editor

D.
environment

Answers

Answer:

It is called the editor script area, hence the name is where you create and edit code.

Hope this help please give the brainliest award.

what is the answer ??​

Answers

Answer:

D all of the above

B operating system

the person above ^ me is correct

How do people decide their ethical behavior

Answers

Explanation:

Ethical behavior is based on written and unwritten codes of principles and values held in society. Ethics reflect beliefs about what is right, what is wrong, what is just, what is unjust, what is good, and what is bad in terms of human behavior.

Answer:

most people go by the crowd to the way they act. theres are also people who have to make very hard decisions and not everyone makes the right choice.

Explanation:

Preset headers and footers cannot have additional information add to the areas.
Group of answer choices

True

False

Answers

the answer to the question is true

Why is the Game Design Document called a ""living"" document AND why is this important?

Answers

Answer:

documentation

Explanation:

Because it gives the instructions rules and every detail about the game with anything in the real world with computers documentation is extremly important  

Name any four constituent of the 8085 microprocessor.

Answers

Answer:

The timing & control unit, the decoder, serial input/output control and the arithmetic and logic unit.

Some common constituents of the 8085 microprocessor may include an accumulator, arithmetic and logic unit, temporary register, flag register, and address data bus.

What is the configuration state of the 8085 microprocessor?

The configurations state of the 8085 microprocessor mainly include some other constituents like data bus-8-bit, address bus-16 bit, program counter-16-bit, stack pointer-16 bit, registers 8-bit, +5V voltage supply, and operates at 3.2 MHz single segment CLK.

According to the context of this question, an accumulator is an 8-bit register used to perform arithmetic, logical, I/O & LOAD/STORE operations. It also mutually supports the arithmetic and logic unit along with some common types of registers.

Therefore, some common constituents of the 8085 microprocessor are well described above.

To learn more about the microprocessor, refer to the link:

https://brainly.com/question/29243062

#SPJ5

Prereading strategies involve ООО introducing a text. previewing a text. summarizing a text. interpreting a text. ​

Answers

Answer:

A.

Explanation:

Mark Brainliest if correct!

Answer: Previewing a text. (C)


Explanation: Just got it right.

Dữ liệu trong 1CSDL được lưu trong

Answers

Answer:

ha ano daww??

Explanation:

??? btw thanks for the points

what is one disadvantage people face without a checking account?

Answers

Answer:

If they have a job that only pays with ckecks they won't be able to have their paycheck.

Explanation:

a researcher is interested in assessing risk-taking

Answers

Answer:

Risk-taking is a dangerous behavior

Explanation:

Knowing this he /she should take the proper safety measures

how many times should the start function be defined in a program?

Answers

Answer:

0 1 2 However many you like

✓ I think its 2x they will start to define the program

30 points!!! Due Tomorrow. ICT test on memory, CPU, motherboard and dedicated/embedded systems and general purpose systems. Any tips?​

Answers

Answer:

Just get it right and don't get stressed

Explanation:

An embedded system is a computer system—a combination of a computer processor, computer memory, and input/output peripheral devices—that has a dedicated function within a larger mechanical or electronic system.[1][2] It is embedded as part of a complete device often including electrical or electronic hardware and mechanical parts. Because an embedded system typically controls physical operations of the machine that it is embedded within, it often has real-time computing constraints. Embedded systems control many devices in common use today.[3] In 2009 it was estimated that ninety-eight percent of all microprocessors manufactured were used in embedded systems.[4]

a modem is required for ________________ internet access.

Answers

Broadband I believe!

whenever I try to make an account it says it can't sign me up at this time or something- can you help?-

Answers

Answer:

You can try emailing tech support and describing your issue. In order to get the best help as quickly as possible, try providing screenshots of what happens when you sign in or describe everything you see on the screen when the problem occurs, and quote error messages directly when possible.

how do spear phishing attacks differ from standard phishing attacks?

Answers

Answer:

Phishing attacks normally target random people on mass amount by sending emails to users. In the other hand the spear phishing only targets 1 person hence the name "spear".

Hope this help please give the brainliest award.

did someone hang themselves on set of wizard of oz

Answers

Answer:

One of the most ubiquitous of film legends holds that a munchkin hanged himself on-camera during the filming of 'The Wizard of Oz.' A lovelorn actor portraying one of the munchkins hanged himself on the set during the filming of The Wizard of Oz.

Explanation:

Why would you put money into a savings account? *
To make frequent withdrawals at ATM’s
To access the money from this account with personal checks
To easily access money from this account with a debit card
To earn interest on your money

Answers

Answer:

Most probably option 4, it has nice to earn interest from the bank.

PLEASE HELP PLEAAASSSSSEEEE!


When search engines republish content, it refers to _____.


a leaking data exhaust

an active data exhaust


an active digital footprint


a passive digital footprint

Answers

Answer:

a passive digital footprint

Explanation:

When search engines republish content, it was not information that was intentionally re-released by the owner. This makes it a passive digital footprint.

Answer:

D. a passive digital footprint.

Explanation: got it right

Language learning programs like Rosetta Stone would not be considered a simulation game because you aren’t really practicing verbal skills, you are just memorizing words.

A.
True

B.
Fale

Answers

Answer:

True

Explanation:

Which of the following is an example of a law that governs the information IT workers may have access to in the course of their work?

Answers

Answer:

HIPAA

Explanation:

The Health Insurance Portability and Accountability Act of 1996 is a United States federal statute enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, 1996.

Other Questions
Have you ever had someone who has helped you develop a passion? what did they do? how did the british government react to the boston tea party? NEEED HELP ASAP PLS................. What is the ninth term of the arithmetic sequence defined by the rule below? A(n) = 14 + 2(n 1). The ninth term is what?Please answer will give Brainliest if correct You can spend up to $35 on a shopping trip.a. You want to buy a shirt that costs $14. Identify an inequality that represents the amount of money, x- (in dollars), you will have left if you buy the shirt.b. You notice that the shirt is on sale for 30% off. Identify the new inequality.c. Do you have enough money to buy the shirt that is on sale and a pair of pants that costs $23? Which best explains your answer? need help with history How many zeros are there for the square of 200? 2,3,4,6 Is table salt dissolved in water a homogeneous or heterogeneous mixture Decide if the following statement is true or false. A simple random sample of twelve 2+ bedroom houses in Rockingham County has a mean monthly lease of $695 with a standard deviation of $135. The true rental cost will be from $560 to $830 PLz help Asap 10 POINT I MIGHT GIVE BRAINLIST IF RIGHT AND IF I CAN. Find the equation of the line passing through the points (-3,8) and (3,-4). Write theequation in slope-intercept form. Which of the following words have a similar, negative connotation?A. Unstylish and old-schoolB. Tasty and saltyC. Filthy and grossD. Powerful and tyrannical Ga tr ca biu thc A = ( 2x - 5)x(2x +5) - 4 x (x+2)x(x-2) + (10x + 7) Write out the numbers. 83.860 1. How do COMPROMISES work? Im aerobic cellular respiration, what three major steps are involved jurisdiction.C. For each writer, what is one example of a fact and one example of an opinion?help me how was the rosetta stone key to the legacy of ancient egypt I NEED THE RIGHT ANSWER FOR THIS ASAP NO LINKS !!! 1. Define weight 2. How is the weight of an object related to its mass? 3. If an object has a mass of 50 kg, what is its weight?