Answer:
B) HTTP://
HOPE IT HELPS
PLS MARK ME AS BRAINLIEST
Answer:
It is C) HTTP://
It can also be seen as HTTPS://
Explanation:
What is the shortcut key to apply /remove the subscript effect?
Ctrl+=
Ctrl-+
Answer:
Press "Ctrl, "Shift" and "=" on your keyboard to turn off superscript formatting.
Help please i will mark brainlist!
Name an off-line storage device that is read-only, i.e. cannot be written to.
Answer:
CD-ROMs
Explanation:
Place the following items in the correct order, so that it correctly represents a URL (website address) protocol, path, server, filename
Answer:
protocol, server, path and filename
why are accountablity and trust so important in using emerging technologiess?
Answer:
improvied accuracy, quality and cost efficiencies
What is “Fair Use”?
It is the set of concepts that cannot be copyrighted or trademarked.
It is a set of situations that cause existing trademarks to expire.
It is the set of laws that enforce copyrights and trademarks.
It is a set of legal exceptions to copyrights and trademarks.
Answer:
C
Explanation:
A10:A20 Refer to values in
Question 3 options:
Cell A10 and cell A20
The cell in column A and row 10
The range of cells in column A and rows 10 through 20
The range of cells in row 15 and columns B through #
Create the content for your website.
Please help
This has to be written in rough draft
Please answer the create the content for your website
And thank you
Information systems include all of these
A) People, Software
B) Hardware, Information
C) Data, Procedures
D) All of the above
Answer:
D
Explanation:
because you need people to access software through hardware and data through information and procedures.
VI. Differentiate between systems SUIwal unu up
vii. How a student can use computer to improve academic performance?
ters in
in a scho
nool library.
Answer:
So in a library u might want to get some reading or homework done the way one can use a computer to improve academic preferences is bye one a computer u can type a essay and look for a book
Explanation:
In terms of their eligibility for legal protection, how do ideas differ from song lyrics?
Ideas can be copyrighted, while song lyrics can be trademarked.
Ideas can be copyrighted, while song lyrics cannot be copyrighted or trademarked.
Ideas can be trademarked, while song lyrics can be copyrighted.
Ideas cannot be copyrighted or trademarked, while song lyrics can be copyrighted.
Answer:
D
Explanation:
Answer:
D. Ideas cannot be copyrighted or trademarked, while song lyrics can be copyrighted.
Copyright protection applies to original works that are fixed in a tangible form, such as being written down or recorded. This means that song lyrics are eligible for copyright protection because they are fixed in a tangible form, like sheet music or a recording. However, ideas by themselves cannot be copyrighted or trademarked because they are not fixed in a tangible form, they are not considered a creative work. Copyright applies to the expression of an idea, not the idea itself. Patents may provide protection to some ideas, but only if they are new, useful and non-obvious.
________________, _______________ and ___________ are what you see when you open Excel
Question 10 options:
None of these answers
Columns, rows and cells
Columns, rows and charts
Column, rows and formulas
Rectangular box formed when each column meet
Answer:
If this is a true or false I guess my answer is true?
Explanation:
Which statements describe a peer-to-peer network?
Answer:
In its simplest form, a peer-to-peer (P2P) network is created when two or more PCs are connected and share resources without going through a separate server computer. A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files
Explanation:
Hope this helps
Passwords are required to log in to the network, and relatively low cost represents peer-to-peer network.
What is peer-to-peer network?A peer-to-peer (P2P) network is a type of computer network in which each node (computer) can function as both a client and a server.
In other words, without the need for a centralised server, each node on the network can send and receive data and resources directly from and from other nodes on the network.
There is no single point of failure in a P2P network, and the network nodes are responsible for managing and maintaining the network.
This network type is frequently used for file sharing and collaboration, such as BitTorrent, where users can share large files with one another.
Thus, passwords are required to log in to the network, and the network is relatively inexpensive.
For more details regarding peer-to-peer network, visit:
https://brainly.com/question/10571780
#SPJ2
Your question seems incomplete, the probable complete question is:
Which statements describe a peer-to-peer network?
1. passwords are required to log in to the network
2. provides centralized network security
3. relatively low cost
4. scalable
5. used in organizations with lots of employees
PLEASE HELP ITS URGENT!
A computer follows stepwise instructions to complete any task is known as ?
program
table
scratch
Answer:
program
Explanation:
Program
1.1 Why is primary goal of software development now shifting from
producing good quality software to good quality maintainable software?
is where the term ‘App’ comes from. It is any piece of software that allows us to actually ‘use’ the computer. For example, it may be a word processor, web browser, spreadsheet software or even just a game. Application software relates to the user rather than the hardware
Select the correct locations on the image. Adrian wants to delve into database administration. Which certifications would help him along this career path? PMP Oracle DBA PRINCE2 CSPM MCITP
you can pick multiple
Answer:
Oracle DBA and MCITP