Answer:
The first thing that came to mind was when my parents tell me "Take it one step at a time" I hope this helps
Explanation:
Select the correct answer.
Which statement is true with respect to Java?
Answer:
where are the options ..... to select
based on mla guidelines, what is the correct line spacing?
Answer:
Double spaced lines are correct.
Explanation:
And for works cited use double indent
which of the following has the highest priority?
1) Browser Default
2)External style sheet
3)an inline style (inside a specific HTML element)
4)An internal style sheet (in the head section)
Answer:
External style sheet
Explanation:
External style sheet
Draw a flow chart showing the conversion of temperature from farenheit to degree celsius
I hope this answers help you
Draw a logic gate circuit for each of the following Boolean expressions.
1- F= AB’
2-F = A’ + (B*C)
3-F= (A*B) + (A*C)
Answer:
can you explain more please I didn't understand
what does it mean when the save button on the quick access toolbar changes to a circular set of two arrows?
When the save button on the quick access toolbar changes to a circular set of two arrows, it means that workbook is saved in the cloud (It means word is automatically syncing your changes back to OneDrive).
The Quick Access Toolbar (QAT) is simply known as small modifiable toolbar. It is often located at the top of the office application window that is, it can be seen next to the Microsoft Office button. It is known to have its own set of independent commands and render quick access to commands like Save, Undo, Redo, etc. OneDrive is a renown Microsoft cloud service and a type of cloud services that helps individuals to link up oneself to all our files. It allows storage and protection of files, sharing and get to them any time.Conclusively, we can say that When the save button on the quick access toolbar changes to a circular set of two arrows, it means that workbook is saved in the cloud (It means word is automatically syncing your changes back to OneDrive).
Learn more from:
https://brainly.com/question/17163678
what is the answer ??
Answer:
2nd answer is braille printer1st one is MICR .80percent sure 20 percent not
[tex]▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ { \huge \mathfrak{Answer}}▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ [/tex]
1. Correct choice - MICR
MICR characters are written using oxide of Iron.
2. Correct choice - Braille printer
Braille printer is the device used to give output which can be read by visually impaired people.
what does it mean to clear a setting in a dialog box?
Answer:
to delete it
Explanation:
what is the arrangement of various flash elements, such as the tools panel, control panel, property inspector and stage
Answer:
could have used a browser but ok
Explanation:
The arrangement of various flash elements such as the tools panel control panel property inspector and windows is called the Workspace. Explanation: The workspace in a computer system makes us easy to navigate to different features and control options.
You have a computer that has four DDR2 memory slots. Currently, there are two 512 MB memory modules installed. You check the motherboard documentation and find that the system has a 4 GB memory limitation. You want to add more memory to this system. By adding new memory modules, and without replacing the existing memory modules, what is the maximum total amount of usable RAM you can have in this system
Answer:
2048 MB / 2 GB.
Explanation:
Without removing the other modules you can add two more 512 MB modules for a total of 2048 MB.
A_______VPN connection is a private network that uses a public
network to operate.
A)Point-to-Point
B)Point-to-Tunnel
C)Point-to-Site
D)Site-to-Site
Answer:
letter c. point to site po sagot diyan
jessica has pinned her favorite applications as icons on her desktop .she always clicks on these icons to work them .which user interface is she using here?
Answer:
Graphical User Interface
Explanation:
boolean logic deals with statements having one of _____ values.
Answer:
2 values
Explanation:
boolean statements can only be True or False
what is the general term for programs used to operate a computer
Answer:
Software
Explanation:
ez
Answer: A Software System
What is the best most effective way to add your savings account?
Explanation:
to put money in your savings account for college and Car a house and a.bunch of important stuff in life
rocks created from compaction and cementation of sediments are called:
Answer:
Sedimentary Rocks
Explanation:
Sedimentary rocks are essentially the Frankenstein monsters of the rock world. They're made up of pieces of igneous and metamorphic rocks, sand, clay, and other sedimentary rocks.
Answer:
A sedimentary
Explanation:
hope this helps please mark as brainliest
Which is considered both an input and output device?
Keyboard
Microphone
Speaker
Touchscreen monitor
Explanation:
devices are the pieces of hardware used by a human (or other system) to communicate with a computer. For instance, a keyboard or computer mouse is an input device for a computer, while monitors and printers are output deviceshope this help.Answer:
Touchscreen monitor
Explanation:
You touch it to input commands since it's a touchscreen and it is also a visual output device that interprets data into a picture.
Hope this helps :)
describe accessibility in Windows 7
Answer:
Accessibility is the epitome of usability and was a key tenet throughout the engineering of Windows 7. ... Windows 7 includes accessibility options and programs that make it easier to see, hear, and use your computer including ways to personalize your computers and use keyboard shortcuts.
what is the set of events that occurs between the moment you turn on the computer and the moment you can begin to use the computer
Answer:
Booting
Explanation:
Booting is the process that occurs when you press the power button to turn your computer on. During this process (which may take a minute or two), the computer does several things: It runs tests to make sure everything is working correctly. It checks for new hardware.
Why would you put money into a savings account? *
To make frequent withdrawals at ATM’s
To access the money from this account with personal checks
To easily access money from this account with a debit card
To earn interest on your money
Answer:
Most probably option 4, it has nice to earn interest from the bank.
Select all correct statements below: Group of answer choices A redundant link's switch port will be blocked by STP until needed. An Ethernet network can only have one active path at any time. Both frames and packets are prevented from being retransmitted through a network indefinately due to the TTL feature. STP is used to prevent Ethernet network performance degradation. An IP network can only have one active path at any time.
which of the following is the most reliable storage device:
floppy disk
hard disk
USB
RAM
Answer:
RAM is the most reliable storage device.
what is bitcoin??????
Answer:
a digital or virtual currency created in 2009 that uses peer-to-peer technology to facilitate instant payments.
Explanation:
A) the Operating system is said to provide security. Explain what this means and give an example of a security feature.
It means that thw operating system is up to date with all the lastest protection systems like an anti virus. An example is that the operating system has a built in ransomware protection system ib place.
Hope this help please give the brainliest award
Prereading strategies involve ООО introducing a text. previewing a text. summarizing a text. interpreting a text. ​
Answer:
A.
Explanation:
Mark Brainliest if correct!
Answer: Previewing a text. (C)
Explanation: Just got it right.
what is the url of the website that would allow you to change your password, adjust quotas, and check a list of known computer problems on campus?
Answer:
Go to your schools website and look for the change password, ETC area I would guess it would be a "Help" tab
Explanation:
You did not explain what Campus your on however you can find this yourself pretty easy.
30 points!!! Due Tomorrow. ICT test on memory, CPU, motherboard and dedicated/embedded systems and general purpose systems. Any tips?
Answer:
Just get it right and don't get stressed
Explanation:
An embedded system is a computer system—a combination of a computer processor, computer memory, and input/output peripheral devices—that has a dedicated function within a larger mechanical or electronic system.[1][2] It is embedded as part of a complete device often including electrical or electronic hardware and mechanical parts. Because an embedded system typically controls physical operations of the machine that it is embedded within, it often has real-time computing constraints. Embedded systems control many devices in common use today.[3] In 2009 it was estimated that ninety-eight percent of all microprocessors manufactured were used in embedded systems.[4]
which type of malware typically displays, automatically plays, or downloads advertisements to your computer?
Answer:
Adware
Explanation: Adware displays pop-up advertisements when you are online.
how to get into someones phone without knowing the password iphone
Answer:
you should not do that unless you have a good reason to.
what version of vsftpd contained the smiley face backdoor?
Answer:
Chris Evans, author of vsftpd announced that the master site for vsftpd was compromised and that the latest version of vsftpd (vsftpd-2.3.4.tar.gz) was backdoored. The backdoor payload is interesting. In response to a smiley face in the FTP username, a TCP callback shell is attempted. There is no obfuscation.
Explanation:
The master site for vsftpd was compromised, and the most recent version of vsftpd has a backdoor, according to vsftpd programmer Chris Evans. The payload on the backdoor is intriguing. A TCP callback shell is tried in response to a smiley in the FTP username. There is no concealment.
What version of vsftpd had smiley face backdoor?Vsftpd version 2.3. 4 that could be downloaded from the main site was found to have been compromised in July 2011. A ":)" smileyface can be used as the username when entering into a compromised vsftpd-2.3. 4 server, giving users access to a command shell on port 6200.
The idea behind the attack against VSFTPD 2.3. 4 is to send a specific sequence of bytes on port 21 to start the malicious vsf sysutil extra() function, which, if executed successfully, opens the system's backdoor on port 6200.
causes the backdoor to be opened, which causes a shell to start listening on TCP port 6200. After a client connects to it and disconnects from it, the shell stops listening. This might be used by a remote, unauthenticated attacker to execute arbitrary code as root.
Thus, The master site for vsftpd was compromised, and the most recent version of vsftpd has a backdoor.
For more information about vsftpd had smiley face backdoor, click here:
https://brainly.com/question/535743
#SPJ6