A ____________________ is created from an earlier healthy OS installation on a computer, and contains a backup of the Windows system files and recovery tools to assist in the repair process.

Answers

Answer 1

Answer:

Recovery Drive

Explanation:

I dont know why you deleted it when its the answer


Related Questions

Consider the following code segment: if(!somethingIsTrue()) return false; else return true; } Which one of the following statements would be an accurate replacement for this code

Answers

Based on the code segment given, the accurate replacement for the code would be C) return somethingIsTrue()

What would replace the code accurately?

The code is a logical comparison code which means that it compares two or more values and returns a result based on if the comparison yields a true or false result.

The code segment,  if(!somethingIsTrue()) return false; else return true; } can be replaced by return somethingIsTrue() where the result would either be true or the value for false which is much like the first code.

Options for this question include:

A) return true;B) return false;C) return somethingIsTrue();D) return !somethingIsTrue();

Find out more on problems regarding code segments at https://brainly.com/question/13506144

#SPJ1

A VM user permanently deletes a directory on a guest VM. The Nutanix administrator has enabled Self-Services for this VM.
Which three steps must the administrator perform to restore the directory? (Choose Three)
A. Copy the directory from the snapshot disk to the original VM disk

B. Launch the Nutanix SSR utility on the VM

C. Create a clone of the VM from a previous snapshot and replace the original VM

D. Connect to the cloned VM and copy the directory to the source VM

E. Select and mount the snapshot that contains the deleted directory

Answers

The three steps that the Nutanix administrator must perform to restore the directory are:

A. Copy the directory from the snapshot disk to the original VM disk.

D. Connect to the cloned VM and copy the directory to the source VM.

E. Select and mount the snapshot that contains the deleted directory.

To restore the directory that was permanently deleted by a VM user, the administrator needs to first copy the directory from the snapshot disk to the original VM disk. This step involves accessing the snapshot and retrieving the deleted directory to place it back in its original location on the VM.

Next, the administrator should connect to the cloned VM, which is a copy of the original VM from a previous snapshot. By connecting to the cloned VM, the administrator can access its file system and copy the directory from the clone to the source VM. This ensures that the directory is restored to its correct location on the original VM.

Lastly, the administrator needs to select and mount the snapshot that contains the deleted directory. This step allows the administrator to access the snapshot's contents and retrieve the deleted directory for restoration.

Therefore, the correct options are A, D, and E.

You can learn more about Nutanix at

https://brainly.com/question/31844458

#SPJ11

FILL THE BLANK. in vivo exposure within systematic desensitization is ______ imaginal exposure.

Answers

In vivo exposure within systematic desensitization is real-life exposure.Systematic desensitization is a therapeutic technique commonly used in cognitive-behavioral therapy (CBT) to treat phobias.

In vivo exposure specifically refers to the real-life, physical exposure to the feared stimuli or situations. It involves directly facing the feared object or engaging in the feared activity in the actual environment where it occurs. For example, if someone has a fear of heights, in vivo exposure would involve gradually exposing them to heights in real-life situations, such as climbing a ladder or standing on a high balcony.On the other hand, imaginal exposure is a different technique within systematic desensitization that involves exposure to feared situations or stimuli through imagination or mental imagery. It is typically used when the feared stimuli cannot be easily replicated in real life or when it is impractical to expose the individual directly to the feared situation.

To know more about desensitization click the link below:

brainly.com/question/5557547

#SPJ11

Which statement about assembly-line design is false? Choose all that apply. - Assembly line products have low variety. - Assembly line services have high variety. - Assembly lines have low volumes of output. - The goal of an assembly line layout is to arrange workers in the sequence that operations need. Which statement regarding assembly-line balancing is true? Choose all that apply. - Assembly-line balancing is not a strategic decision. - Assembly-line balancing requires information about assembly tasks and task times. - Assembly-line balancing requires information about precedence relationships among assembly tasks. - Assembly-line balancing cannot be used to redesign assembly lines.

Answers

Assembly line design is a strategy used to streamline manufacturing processes by breaking down tasks into simple and repeatable steps performed by employees. The objective of assembly line design is to establish an efficient flow of work that promotes productivity, reduces waste, and maximizes profits.

Below are the false statements about assembly-line design:

Assembly line products have low variety.Assembly line services have high variety.Assembly lines have low volumes of output. (False)

The goal of an assembly line layout is to arrange workers in the sequence that operations need.Here are the true statements regarding assembly-line balancing:

Assembly-line balancing requires information about assembly tasks and task times.Assembly-line balancing requires information about precedence relationships among assembly tasks.Assembly-line balancing cannot be used to redesign assembly lines. (False)

Assembly-line balancing is a strategic decision that entails dividing the assembly process into smaller units, assigning specific tasks to individual workers, and ensuring that each employee's tasks are consistent with their abilities and skills.

Task times and task relationships are crucial in assembly-line balancing, as the objective is to optimize production while minimizing downtime, labor, and equipment usage.

Learn more about streamline at

https://brainly.com/question/32658458

#SPJ11

cyber terrorism is a handy battlefield for terrorists because it can strike directly at what target that bombs will not effect? group of answer choices the energy infrastructure of an enemy the economy of an enemy the hearts and minds of the citizens of an enemy the defense infrastructure of an enemy

Answers

Cyber terrorism is a handy battlefield for terrorists because it can strike directly at targets that bombs will not affect, such as the energy infrastructure, the economy, and the defense infrastructure of an enemy.

Cyber terrorism offers unique advantages to terrorists as it allows them to target critical infrastructure and systems that are crucial for a nation's functioning. One such target is the energy infrastructure of an enemy. By launching cyber attacks on power grids, terrorists can disrupt the electricity supply, causing widespread chaos and impacting various sectors, including communication, transportation, and healthcare. The economy of an enemy is another target for cyber terrorists. Which leads to destabilize markets, and undermine confidence in the economy. Furthermore, cyber terrorism can strike at the defense infrastructure of an enemy. By targeting military networks, command and control systems, or sensitive defense information, terrorists can compromise national security, disrupt military operations, and gain an advantage over their adversaries. While bombs primarily cause physical destruction and loss of life, cyber terrorism enables terrorists to target intangible but critical aspects of a nation's infrastructure, economy, and defense capabilities. The consequences of successful cyber attacks can be far-reaching, affecting the hearts and minds of the citizens by creating fear, mistrust, and undermining the stability and functioning of a country.

Learn more about Cyber terrorism here:

https://brainly.com/question/30772073

#SPJ11

you are given a dataframe consisting of three columns and four rows. a ufunc is then applied to that dataframe and another dataframe is outputted. how many columns are present in that final dataframe

Answers

If a person is given a dataframe consisting of three columns and four rows. the columns that are present in that final dataframe is 7.

What is a DataFrame?

A DataFrame is known to be a term that connote a kind of a data structure that put together data into a kind of a 2-dimensional table that is said to be made up of rows and columns, such like a spreadsheet.

Note that DataFrames are said to be one of the most popular data structures that is said to be used in modern data analytics due to the fact that they are a flexible and good way of saving and working with data.

Hence, If a person is given a dataframe consisting of three columns and four rows. the columns that are present in that final dataframe is 7.

Learn more about  data frame from

https://brainly.com/question/24024733

#SPJ1

Question 4 0.4 pts What are the popular avenues for publishing a Web site once it has been built? O online services, software tools, and plain text editors O ASP.NET, Dreamweaver, and JavaServer Pages O ISPs, free sites, and Web hosting services Nvu, Adobe ColdFusion, and Rapid Weaver

Answers

A website can be published through a variety of methods.  Services for web hosting: By offering server space for your website files, these services enable you to publish your website on the internet.

Who offers clients services that let them publish websites on the Internet?

Typically, web hosting takes place at a data center, which offers clients services that let them publish websites on the Internet. Also, a web host can offer data center space and an Internet connection for servers that belong to other people. Web hosting is the name of the service that a Web host offers.

Which of the following choices best fits the criteria for web publishing?

To publish information on the Internet, a publisher needs three things: software for creating websites. access to the internet. hosting the webpage on a web server.

to know more about the Website here;

brainly.com/question/29777063

#SPJ1

Several people work with data at Erica’s office. She enters data. One of her coworkers enters new product numbers. Another coworker searches for parts that need to be ordered. Erica’s company uses a _____.


spreadsheet

Web page

data warehouse

word processor

Answers

Spread sheet I think

which of the following statements about browser security settings are true

which of the following statements about browser security settings are true

Answers

The options that are true regarding browser security settings are options:

A. You can choose which sites run pop-ups.

C. You can deny cookies and

D. Sites can be allowed or blocked from running scripts

How can you check browser security settings?

To inspect your security settings, pull down the notification bar and press the gear symbol. Scroll down to the security and location section. The screen lock setting may be found under device security.

Option B is incorrect. Web history is not always saved indefinitely and can be erased manually or automatically depending on the browser settings.

Never submit your password or credit card information on sites that display this warning. If you must use the site, contact its owner or administrator and inform them that it is not secure.

Learn more about browser security settings  at:

https://brainly.com/question/25014794

#SPJ1

Full Question:

Which of the following statements about browser security settings are true? Select all that apply. A. You can choose which sites run pop-ups. B. Your accumulated web history is stored forever. C. You can deny cookies. D. Sites can-- be allowed or blocked from running scripts

what is the main purpose of the circulatory system

Answers

The network of blood vessels and the heart that carries blood throughout the body. This system helps tissues get the right amount of nutrients, oxygen, and waste disposal.

The most important component of the circulatory system?

The primary function of the circulatory system is to carry oxygen, nutrients, and hormones to the muscles, tissues, and organs throughout the body. Another role of the circulatory system is to remove waste from cells and organs so that your body can eliminate it.

What is the primary goal of this quiz about the circulatory system?

The circulatory system's job is to provide nutrients and oxygen to body cells while returning carbon dioxide and oxygen-poor blood to the heart and lungs.

To know more about circulatory system visit:-

https://brainly.com/question/29259710

#SPJ4

What is a recent innovation in edge computing enhanced by 5G?.

Answers

A recent innovation in edge computing enhanced by 5G is placing computing resources physically inside the network infrastructure.

5G is the fifth generation of mobile communications operating on the basis of telecommunication standards, following the existing 4G.

5G technologies must provide higher bandwidth than 4G technologies, which will ensure greater availability of mobile broadband, as well as the use of device-to-device modes (direct connection between subscribers).

It also allows ultra-reliable large-scale systems communication between devices, as well as less latency, higher speed, and less battery power consumption than 4G equipment.

Learn more about computers in https://brainly.com/question/24836371

Select the correct answer
in the context of website navigation, what is a node?
a point at which the user chooses a certain path
a part of a web page that gives it a unique identity
a navigational aid that tells users know where they are
a hyperlink that leads to the home page

Answers

Answer:

a point at which the user chooses a certain path.

Answer:

a point at which the user chooses a certain path.

Explanation:

What is the closest catch2 equivalent of cassert’s assertions?.

Answers

Answer:

u have no luck asking on here nobody knows these anwsers

Explanation:

The  closest catch2 equivalent of cassert's assertions is Catch.

How does assert H work?

The assert. h is known to be a kind of header file that belongs to the C Standard Library and it is one that helps to give a macro known as assert which is often used to verify assumptions made by a program.

Note that in the case above, The  closest catch2 equivalent of cassert's assertions is Catch.

See full question below

What is the closest catch2 equivalent of cassert's assertions?

Assert

Catch

Require

Test

Learn more about assertions from

https://brainly.com/question/13628349

#SPJ6

how does air conditioner work
please short answer please​

Answers

It draws the warm/ hot air from inside to outside and the AC unit (usually outside) turns the vapor into a liquid which removes any excess heat. (This is the way I learned it)
The air conditioner in a central heating and cooling system provides cool air through ductwork inside your home, by providing a process that draws out the warm air inside, removing its heat.

in Qbasic how I type the diference between two numbers?

Answers

Answer:

REM PROGRAM TO DISPLAY SUM OF TWO NUMBERS

CLS

INPUT “ENTER FIRST NUMBER”; A

INPUT “ENTER SECOND NUMBER”; B

S = A + B

PRINT “SUM OF TWO NUMBERS”; S

END

USING SUB PROCEDURE

DECLARE SUB SUM (A, B)

CLS

INPUT “ENTER FIRST NUMBER”; A

INPUT “ENTER SECOND NUMBER”; B

CALL SUM(A, B)

END

SUB SUM (A, B)

S = A + B

PRINT “SUM OF TWO NUMBERS”; S

END SUB

USING FUNCTION PROCEDURE

DECLARE FUNCTION SUM (A, B)

CLS

INPUT “ENTER FIRST NUMBER”; A

INPUT “ENTER SECOND NUMBER”; B

S = SUM(A, B)

PRINT “SUM OF TWO NUMBERS”; S

END

FUNCTION SUM (A, B)

SU = A + B

SUM = SU

END FUNCTION

2. Enter any two numbers and display its difference.

REM PROGRAM TO DISPLAY DIFFERENCE OF TWO NUMBERS

CLS

INPUT “ENTER FIRST NUMBER”; A

INPUT “ENTER SECOND NUMBER”; B

D = A - B

PRINT “DIFFERENCE OF TWO NUMBERS”; D

END

USING SUB PROCEDURE

DECLARE SUB DIFF (A, B)

CLS

INPUT “ENTER FIRST NUMBER”; A

INPUT “ENTER SECOND NUMBER”; B

CALL DIFF(A, B)

END

SUB DIFF (A, B)

D = A - B

PRINT “DIFFERENCE OF TWO NUMBERS”; D

END SUB

USING FUNCTION PROCEDURE

DECLARE FUNCTION DIFF (A, B)

CLS

INPUT “ENTER FIRST NUMBER”; A

INPUT “ENTER SECOND NUMBER”; B

DI = DIFF(A, B)

PRINT “DIFFERENCE OF TWO NUMBERS”; DI

END

FUNCTION DIFF (A, B)

D = A - B

DIFF = D

END FUNCTION

3. Enter any two numbers and display its product.

REM PROGRAM TO DISPLAY PRODUCT OF TWO NUMBERS

CLS

INPUT “ENTER FIRST NUMBER”; A

INPUT “ENTER SECOND NUMBER”; B

P = A * B

PRINT “PRODUCT OF TWO NUMBERS”; P

END

USING SUB PROCEDURE

DECLARE SUB PROD (A, B)

CLS

INPUT “ENTER FIRST NUMBER”; A

INPUT “ENTER SECOND NUMBER”; B

CALL PROD(A, B)

END

SUB PROD (A, B)

P = A * B

PRINT “PRODUCT OF TWO NUMBERS”; P

END SUB

USING FUNCTION PROCEDURE

DECLARE FUNCTION PROD (A, B)

CLS

INPUT “ENTER FIRST NUMBER”; A

INPUT “ENTER SECOND NUMBER”; B

PR = PROD(A, B)

PRINT “PRODUCT OF TWO NUMBERS”; PR

END

FUNCTION PROD (A, B)

P = A * B

PROD = P

END FUNCTION

4. Enter any two numbers and display its average.

REM PROGRAM TO DISPLAY AVERAGE OF TWO NUMBERS

CLS

INPUT “ENTER FIRST NUMBER”; A

INPUT “ENTER SECOND NUMBER”; B

AV = (A + B) / 2

PRINT “AVERAGE OF TWO NUMBERS”; AV

END

USING SUB PROCEDURE

DECLARE SUB AVERAGE (A, B)

CLS

INPUT “ENTER FIRST NUMBER”; A

INPUT “ENTER SECOND NUMBER”; B

CALL AVERAGE(A, B)

END

SUB AVERAGE (A, B)

AV = (A + B) / 2

PRINT “AVERAGE OF TWO NUMBERS”; AV

END SUB

USING FUNCTION PROCEDURE

DECLARE FUNCTION AVERAGE (A, B)

CLS

INPUT “ENTER FIRST NUMBER”; A

INPUT “ENTER SECOND NUMBER”; B

AVGR = AVERAGE(A, B)

PRINT “AVERAGE OF TWO NUMBERS”; AVGR

END

FUNCTION AVERAGE (A, B)

AV = (A + B) / 2

AVERAGE = AV

END FUNCTION

Explanation:

Pls mark brainliest

Answer:

its because a number segment is diffrent

Explanation:

bc thats what it is

While loop project
Reference codeacademy lesson called loops
Need help writing this code
Create a program that
1) outputs the name priya 100 times (all on different lines)
2) output the name priya 100 times (10 on 10 lines)
3) output the sum of numbers from 1 to 1000
4) output the product of numbers from 1-8
5) list all the numbers from 100 down to 1
Complet in this order

Answers

Answer: Change this however you'd like :)

Explanation:

for n in range(100):

   print("priya")

print()

for n in range(10):

   for i in range(10):

       print("priya", end= " ")

   print()

print()

tempList = []

for n in range(1, 1001):

   tempList.append(n)

print(sum(tempList))

print()

for n in range(1, 9):

   for i in range(1, 9):

       print(n*i)

print()

x = 100

while x != 0:

   print(x)

   x -= 1

A technically qualified individual who may configure firewalls and IDPSs, implement security software, diagnose and troubleshoot problems, and coordinate with systems and network administrators to ensure that security technical controls are properly implemented is known as a

Answers

Answer:

Security technician

Explanation:

Security technicians are responsible for fixing, planning, and implementing the IT and computer security system of organisations by making sure the safety and security of the data and information of the clients as well as the employees that make daily use of the systems

Security technicians administer security access to the clients and employees of the organization and are responsible for being up to date with the latest IT security technology developments.

Explain why it is important to use the correct spatial
referencing method, map projection and datum in a GIS project

Answers

Answer:

Using the correct spatial referencing method, map projection, and datum in a Geographic Information System (GIS) project is crucial for several reasons:

Explanation:

Accurate Geospatial Analysis: GIS projects involve analyzing and visualizing spatial data. Choosing the appropriate spatial referencing method ensures that the data aligns accurately with the real-world geographic coordinates. It enables accurate geospatial analysis, such as measuring distances, calculating areas, and performing spatial queries.

Data Integration and Interoperability: GIS projects often involve combining datasets from various sources and integrating them into a common spatial framework. Using consistent map projections and datums ensures that different datasets align properly and can be integrated seamlessly. It facilitates data interoperability, allowing different GIS layers to be overlaid and analyzed together accurately.

Avoiding Distortions and Errors: Different map projections introduce distortions in representing the curved Earth surface on a flat map. Each map projection has its own strengths and limitations, and choosing the appropriate one for a specific project minimizes distortions and errors. Using an unsuitable map projection can lead to inaccuracies, such as misshapen features, distorted distances, or incorrect spatial relationships.

Coordinate Transformation and Data Sharing: GIS projects often require sharing data with others or integrating data from different regions or coordinate systems. By using the correct datum and coordinate transformation techniques, data can be accurately converted between different spatial referencing systems, ensuring seamless data sharing and integration. It facilitates collaboration among different stakeholders and allows for the proper analysis of data across different geographic areas.

Standardization and Consistency: Following established spatial referencing methods, map projection standards, and datums ensures consistency across GIS projects and promotes interoperability with existing geospatial datasets and systems. It enables data sharing, comparison, and analysis between different projects and organizations, fostering a standardized and compatible geospatial data environment.

in addition to good design sense, what else do web designers need to be proficient in?

Answers

Web designers need to be proficient in Front-end coding languages in addition to good design sense.

Web designers build or redesign websites. They understand what it takes to make a website functional and easy to use, but also understand what is needed to make it aesthetically appealing to the user.

Web designers need to be proficient in Front-end coding languages in addition to good design sense.

Find out more on web design at: https://brainly.com/question/8391970

Why do you think it is important to know typography and color when designing web sites?

Answers

Answer:

Good typography will establish a strong visual hierarchy, provide a graphic balance to the website, and set the product’s overall tone.

Explanation:

Typography can inform your users, optimize readability and accessibility, and ensure an excellent user experience.

Answer:

Typography is so much more than just choosing beautiful fonts, it’s a vital component of user interface design. Good typography will establish a strong visual hierarchy, provide a graphic balance to the website, and set the product’s overall tone. Typography should guide and inform your users, optimize readability and accessibility, and ensure an excellent user experience.

Explanation:

hope this helps

which statements compares the copy and cut commands

Answers

The statement that accurately compares the copy and cut commands is 2)Only the cut command removes the text from the original document.

When using the copy command, the selected text is duplicated or copied to a temporary storage area called the clipboard.

This allows the user to paste the copied text elsewhere, such as in a different location within the same document or in a separate document altogether.

However, the original text remains in its original place.

The copy command does not remove or delete the text from the original document; it merely creates a duplicate that can be pasted elsewhere.

On the other hand, the cut command not only copies the selected text to the clipboard but also removes it from the original document.

This means that when the cut command is executed, the selected text is deleted or "cut" from its original location.

The user can then paste the cut text in a different place, effectively moving it from its original location to a new location.

The cut command is useful when you want to relocate or remove a section of text entirely from one part of a document to another.

For more questions on cut commands

https://brainly.com/question/19971377

#SPJ8

Question: Which statement compares the copy and cut commands?

1. only the copy command requires the highlighting text

2. only to cut command removes the text from the original document

3. only the cut command uses the paste command to complete the task

4. only the copy command is used to add text from a document to a new document

do you think authentication protocols are sufficient to combat hackers? in your opinion what can be done to further secure our data and identities?

Answers

In my opinion, this protocol is good enough to combat hackers and other system intruders who try to tamper with data in transit.

If passwords irritate you, two-factor authentication probably won't get as much attention. However, according to security experts, using two-factor authentication is one of the best ways to protect your online accounts from the most sophisticated hackers.

Two-factor authentication is so named because it adds another authentication factor to the normal login process in addition to your password. After entering your username and password, you will be prompted to enter a code. The code will be sent as a text message, email, or in some cases as a phone push notification. All in all, the day is just a few seconds longer.

Two-factor authentication (also known as "two-factor authentication") consists of something you know, such as your username and password, and something you have, such as your mobile phone or physical security key. Furthermore, it is a combination of what the user has. Use fingerprints or other biometrics to verify that the person is authorized to log in.

To know more about authentication click here:

https://brainly.com/question/28398310

#SPJ4

Aside from ms excel, what other spreadsheet programs are used today find out what these are and describe their similarities and differences with excel.

Answers

Answer:

Libre office, Gogle sheet

Explanation:

Spreadsheets programs are immensely useful to organizations as they are used for entering data and making several analytical calculations and

decision. The most popular spreadsheet program is Excel which is from Microsoft. However, other spreadsheet programs have been developed. The most common of those are ;Libre office and Gogle sheets.

Similarities between the programs include :

Most have similar functionality and aim, which is to perform and make analytics easy.

The differences may include ; Microsoft excel is credited to Microsoft corporation and the program which forms part of Microsoft office suite including Word , power point, outlook e. T c. Microsoft excel is this not a free program.

Gogle sheets is from Gogle.

Libre office is open source and hence it is free

Consider a partial output from a cost minimization problem that has been solved to optimality. name Final value shadow price constraint R.H side allowable increase allowable desrease
labor time 700 -6 700 100 200
The Labor Time constraint is a resource availability constraint. What will happen to the dual value (shadow price) if the right-hand-side for this constraint increases to 750 ?
a. It will be zero. b. It will be positive. c. It will remain at −6. d. It will be more negative. e. It will be less negative.

Answers

Option(e) is correct. The Labor Time constraint is a resource availability constraint. If the right-hand side for this constraint increases to 750, the dual value (shadow price) will be less negative.

Resource availability constraints imply a scarcity of resources. The limiting factor is that these constraints limit the production or output of an organization. Constraints of resource availability are represented as linear equations in optimization problems, which must be fulfilled. These constraints specify the maximum number of resources that can be used in production, the minimum amount of production that must be achieved, and the availability of specific resources within the plant, among other things.The allowable increase and decrease in the right-hand side of the constraint of labor time are 100 and 200, respectively.The allowable increase is 50. Therefore, the shadow price will be less negative. As a result, the correct option is (e) It will be less negative.

To learn more about resource availability constraints please visit:

https://brainly.com/question/14977242

#SPJ11

Cleo received a message from Joline that was sent to her as well as two other coworkers named Sam and Thomas. Cleo would like to send the message she received to Anne.

Answers

Forward or Screenshot or Copy

Answer:

c

Explanation:

How do I delete the Chrome apps folder, because I tried to remove from chrome but it won't let me

Answers

Answer:

Explanation:

1. Open your Start menu by selecting the Windows logo in the taskbar and then click the “Settings” cog icon.

2. From the pop-up menu, click “Apps.”

3.Scroll down the “Apps & Features” list to find  g00gle chrome

4. Click “G00gle Chrome” and then select the “Uninstall” button.

Hope this help!

Helped by none other than the #Queen herself

A pennant-shaped sign means you are in a _____ zone.

Answers

Answer:

The pennant-shape is only used as a road sign to signal a no-passing zone. No passing zones are stretches of roadway where drivers are not allowed to move into the adjacent lane to pass a vehicle in front.

PLSS help im so desperate!! 30 pts n brainliest
This is for intro to network systems//// I will delete invalid answers! I rlly need help

Question: Explain each kind of pointer and for what it is appropriate.

Answers

hope someone helpsssss

A pointer is nothing but a memory location where data is stored. A pointer is used to access the memory location. There are various types of pointers such as a null pointer, wild pointer, void pointer and other types of pointers.  When you want to deal different variable data type, you can use a typecast void pointer.

What is one step taken when solving a computer software problem?

Answers

scanning the computer and deleting any viruses

[ if this helped you please give brainliest :) ]

Answer:

B. scanning the computer and deleting any viruses

Explanation:

edge 2020

pls answer this for me

pls answer this for me

Answers

free points thanks :D
Other Questions
At which of the following locations in the stream was there most likely a discharge of excess organic matter into the water? Mr. Jones's prescription calls for 1.04 tablets per day. Based on this information, how many tablets should Mr. Jones take per day? a) 1.25 O b) 1.5 c) 1 O d) 2 PLEASE HELP IF YOUR GOOD AT (proportional relationships!) Fill in the table using this function rule.y=6x+4X Y47810 Tetrodotoxin (TTX) and botulinum toxin (BTX) are two neurotoxins that causes paralysis. What is(are) the underlying mechanism(s)? a) Both block the voltage-gated Na+ channels to inhibit the firing of What are the first words of the Constitution?We hold these truthsWe the peopleFour score and seven years agoAll mean are created equial What best explains the physical change of liquid water to ice?The liquid water was condensed.The liquid water was melted.The liquid water was frozen.The liquid water was heated. what project role ensures that the system conforms to information system standards? question 8 options: project manager business analyst infrastructure analyst systems analyst change management analyst Different between life insurance and non Life Insurance in five points? whihc of the following salt has the highest concentration of silver ion when dissolved in water?AgCl Ksp = 1.6 x 10-10Ag2CO3 Ksp = 8.1 x 10-12AgBr Ksp = 5.0 x 10-13AgI Ksp = 8.3 x 10-17 What is the value of the expression below when x = 2 x + 2 Coach Murphy has the football team run stairs for practice. Each set of stairs has 75 steps. They have to do 6 sets and have already run 300 stairs. Nine times the sum of a number and 8 is equal to 7. The gravitational force between the Sun (mass = 1. 99 1030 kg) and Mercury (mass = 3. 30 1023 kg) is 8. 99 1021 N. How far is Mercury from the Sun? 6. 98 1010 km 6. 98 107 km 4. 87 1013 km 4. 87 1024 km. Find the unit rate. 123 miles in 3 hoursRemember, you are figuring out how many miles will be traveled in 1 hour.Answer: _____ miles in 1 hour OR ____ miles per hour OR ____ mph Write your answer in simplest form.Be sure to include the correct unit in your answer. What is Elizabeth's attitude toward the theater? Mark recorded the temperature each day for a week. He calculated the mean temperature and found it was 21.6C Marks thermometer was not working properly. All seven temperatures were 3 too high. Write down the correct mean temperature. Which of the following is an example of maintaining homeostasis?A) LearningB) JumpingC) ShiveringD) Smiling Compare and contrast the organization learning interventions withknowledge management interventions. Discuss the benefits ofeach.