Answer:
Real Time Operation System
Explanation:
Explain how this transfer observes the conservation of change
Answer:
The law of conservation of charge states that charge is always conserved. ... Charge is neither created nor destroyed; it is simply transferred from one object to another object in the form of electrons.
Explanation:
why do people yeet yeet and ree
Answer:
Cause they are trying to be annoying
Explanation:
Something is wrong with them :)
Answer:
to be annoying
Explanation:
Name the part of the computer that stores all information and software.
Answer:
Hard Drive
Explanation:
Answer:
The Hard drive
Explanation:
Is the PS5 worth it?
I’m planning on getting one so I need to know. Also, I am giving 100 points. Please answer quickly.
Answer:
Do your Homework
Explanation:
Save up the money and watch multiple videos and reviews, unboxing, etc. Trust me it helps lol
Save up that money tho
Plz mark brainliest
Innovation allows producers to what
If you used an Atbash cipher to encrypt the following message, what would the output be?
HELLO
Answer:
SVOOL
Explanation:
sandra has houseplants sitting on her kitchen windowsill, where it receives a lot of sunlight . what will most likely be the plant's pattern of growth?
Answer:
A. The cells on the shaded side of the plant will grow longer, causing the opposite side of the plant to grow toward the window.
Explanation:
Answer:
the cells on the shaded side of the plant will grow longer, causing the opposite side of the plant to grow toward the window.
Explanation:
Because thats how plants work.
How tractors are controlled
Examples of how robotics and automation have merged tasks in the field
How equipment size has changed
What tractor operators use to monitor equipment
Electronic tractor management systems
How farming productivity and efficiency has changed as a result of automation and robotics
define online pollution
Explanation:
E-Pollution is the environmental damage that comes from the constant heat and cooling down in facilities that are referred to data centers. Data centers are where online information is collected, processed, stored and exchanged.
For what purposes do students collect data? Check all that apply.
to check a statement's credibility
to answer a question
to support an argument
to evaluate a statement
to examine a question's reliability
Answer:
sounds like all of the above
Explanation:
only one im not 100% sure on is to examine a question's reliablity
Answer:
1
2
3
4
Explanation:
please write a 200 to 300 word of the topic you choose
read the direction and answer if you do i will give you brainlest!!!!!!!
Answer:
There is a scar above my brother’s knee.
This scar tells a story of distance.
You should know for the longest time my dad worked the late shift. He’d sleep in the day and then be up all night. Because of this, we didn’t get much time with him.
We always joked about Jon being Dad’s favorite.
Although a joke, there was still some semblance of truth to our kidding around.
Most mornings when Mom had time, she’d apply her makeup in the dining room. She’d sit on the floor cross legged, peering into the mirror. Months earlier the mirror came loose from our bathroom cabinet, so now Mom found herself sitting here daily. You should know, the mirror wasn’t in a frame. Instead it had sort of an unfinished edge. This morning Mom in her haphazard rush to get out the door, precariously placed the mirror overlapping the door frame.
I imagine I was chasing Jon around the house one summer morning. Although two years younger than me, he could always hold his own against me. Most often, we didn’t fight, but instead pushed each other to be more competitive. Mostly we played. From lava, to tag, to wrestling, hide-n-go seek, to ninja turtles. We were always roughing about.
Loop after loop we were silly and screaming. “I’m gonna get you now! Come hear sucka! You’re going to DIE!!” “Nuh uh!!” We were endless in our back and forth pursuit of each other. Sometimes we’d chase each other and wrestle over something: the remote control, a toy, a snack, a dictionary.
So now I was hot on Jon’s tail. He turned a corner and I gained on him through the living room.
Instantly Jon crumpled to the ground. A scream hung in the air.
“Chaz!! Stop!!
A flood of red began to seep through Jon’s jeans. I’d never seen this much blood before. Panic settled in.
“Sorry. Sorry! What happened?”
Silence from my brother. The mirror had sliced and sunk into his skin.
I hurried to the phone. Dialed mom’s work. 342-2746.
“Bob’s Tasty Treats.”
“Is Penny there? I need to talk to my mom.”
“Just a second.”
“You know I’m busy. What’s going on?”
“Mom. Jon just sliced his knee open. There’s blood. Like so much blood. It’s everywhere. Help. What do we do?”
“Have you told your dad?”
“Oh yeeeaah… K. Love you so much. Bye”
I rushed upstairs and woke dad up from his slumber. “Dad! Dad! Jon’s hurt. He’s bleeding. Get up!”
I’m not sure what followed. I imagine Dad rushed down the stairs and wrapped Jon’s knee up in a towel or something. He probably packed us all in to our Red Lumina and rushed Jon off to the hospital twenty minutes away. Jon got stitches. I’m not sure how many. Jon doesn’t even know anymore. All Jon really remembers is the pain.
In the years that passed I began to wonder why we didn’t go upstairs to dad in the first place. Why’d we call mom first?
Through a conversation with my sister, we realized this was our normal. Although Dad was around, he was never present. He was absent so often that in a time of crisis we didn’t even turn to him. As a father, I want to be present.
hope mine gets picked i really need it also good luck on this!
I’ll mark Brainliest
Jasmine wants electrical current to be able to pass through a certain switch on a circuit board that they are designing.
What state should that switch be in?
state 1
state 0
input
output
Answer:
Explanation:
state o
Jen’s house contains the following devices:
Jen’s laptop, which is wirelessly connected to the home network router and turned on
her husband’s PC, which connects to the router by a cable but is turned off
her mother’s virus-infected computer, which has been unplugged from the router
her daughter’s smart phone, which is wirelessly connected to the router
Select all that are correct:
Jen’s network is a WAN.
Jen’s network is a processor.
There are three networked computers in Jen’s house.
Jen’s router is a server.
Jen’s network is a cloud.
Jen’s mother’s computer is not part of the network.
All the computers in Jen’s home besides her mother’s are peers, whereas her mother’s computer is a slave.
Answer:
The anserw is the first one
Explanation:
Hoped it help
expalin the defference between the driver of a desktop and a laptop
Answer:
None, drivers are hardware specific, if both devices share the same hadware manufacurer they tend to have the same drivers.
A driver is a software component that lets the operating system and a device communicate with each other. So asking for a difference in drivers is as asking the difference in hardware in both devices, though one tends to be more intergrated they are all the same in low level functions
Also drivers might not even communicate directly with the device but send a request. thats why some drivers can be written directly into an operating system.
Type the correct answer in the box. Spell all words correctly.
What kind of graph or chart does this image represent?
The given image represents a
.
Answer:
its a bar graph
but some people also call it a line graph
i hope that helped
Answer:
bar graph
Explanation:
lots of bars
look at the answer above mine
Answer:
ok will do
Explanation:
but hi again friend
WILL GIVE BRAINLIEST
Use the conversion table below to help you answer the question.
Which choice represents a correct conversion of the hexadecimal value “CAB”?
A the decimal string 12 10 11
B the octal string 14 13 12
C the binary string 1100 1101 1110
D the octal string 12 13 14
Answer:
its a: the decimal value!
Explanation:
Answer:
It's a
Explanation:
Hackers crack hash functions by finding collisions or pre-generating millions of hashes and comparing them until find the one generated it.
A. True
B. False
Answer:
A.true
Explanation:
Answer:
The answer is A. True
Explanation:
To move a text placeholder, you must first _________________
Double click it
Right click it
Click the border of it
Left click it
When would it be most beneficial to package a presentation on a CD? Check all that apply. when sending the file via email for distribution of very large files as a promotional gift for customers when uncertain of on-site equipment when presenting in public environments when sending a PowerPoint file for review
Answer: b,c,d, e
Explanation:
Got it right on edg 2020 hope this helps
Answer: B C D E
for distribution of very large files
as a promotional gift for customers
when uncertain of on-site equipment
when presenting in public environments
Explanation:
i like ur cut g.......
How has technology changed in the last 10 years?
The two primary methods of memory allocation are:
RAM and ROM.
Mac and Windows.
peripheral and CPU.
stack and heap.
Answer:
The answer is
Stack and heap
Applying a bug fix:
Addressing a security flaw:
Improving ease of use:
Adding new features:
<>
1.software update(patch)
2.software update(patch)
3.software upgrade(new version)
4.software upgrade(new version)
The matching of item A with respect to item B is as follows:
Software update (patch): Applying a bug fix. Software update (patch): Addressing a security flaw.Software Upgrade (new version): Improve ease of use:Software Upgrade (new version): Adding features. What is a Software update?A software update may be characterized as a set of changes to the software to update, fix or improve it. It also changes to the software will usually either fix bugs, fix security vulnerabilities, provide new features or improve performance and usability. It is also known as a patch.
Software updates provide more than just security updates, they often offer new and improved features and speed enhancements to make the end-user experience better. Developers are constantly working on ways to improve the software, giving greater efficiency to users.
Therefore, the matching of item A with respect to item B is well described above.
To learn more about the Software update, refer to the link:
https://brainly.com/question/5057366
#SPJ2
A traditional economy features:
A. the government directly controlling the production and sale of
goods.
B. people relying on customs to make economic decisions.
C. private companies operating without government interference.
D. the government placing some regulations on private businesses.
SUBMIT
Answer: It’s B people relying on customs
What games do you play?
Be sure not to report any answers!
Brainly! This app is amazing!
What is 4991 rounded to the nearest thousand
Answer:
5000
Explanation:
Answer: 5000
Explanation:
This is the answer because of the nine’s.
What Is Better, A GTX 1660 Or Radeon Rx 5500XT
Answer:
I say Radeon Rx 5500XT
Explanation:
PLZZ HELP TAKING TEST Which of these is a way that web developers work around the problem of not knowing the screen resolution at which a user will view a web page?
using HTML to create the page
creating different sets of pages for different resolutions
storing the website on a web server
using a mobile app building application instead of a web development tool
Answer: I believe it's using HTML to create the page.
Explanation:
The answer choice which is a way that web developers work around the problem of not knowing the screen resolution at which a user will view a web page is:
A., using HTML to create the pageWhat is a Website Design?This refers to the various processes of creating, designing a web page which serves user needs.
With this in mind, we can see that some of the programming languages which are needed to design a website includes:
HtmlCssJavascriptJquery, etc.Furthermore, if a web developer wants to solve the problem of screen resolution of his viewers, then he would have to use HTML to create the pages.
Read more about web design here:
https://brainly.com/question/25941596
NEED HELP ASAP!!!!!!!!!!!
What can happen if music is downloaded illegally from a P2P network?
Large fines may have to be paid.
O Your computer screen will freeze.
O Your computer will shut down.
You will not receive the correct music.
how does having weak security on your browser represent the weakest link in a network
Answer:
1. Your location is always exposed "might not be a problem, until it is"
2. Computer Viruses as your browser allows them
3. Hackers, of course, Ransomware attacks
4. SpyWares, read terms and condition or atleast visit trusted sources
5. Phishing, intermediatte security can handle this risk, but fatal if not. as in online identity stolen, bank accounts accessed.
6...... ALWAYS STAY SECURED
YOU WERE NEVER THE TARGET, JUST THE VICTIM