Answer:
it is A and have a wonderful day
cookies that remain on your device indefinitely are called
Answer:
Persistent Cookies: Persistent cookies stay on the user's browsing device until the user clears them or until they reach their expiration. Persistent cookies are those that retain information on the user's specific preferences so that we can provide a “personalized” user experience.
Explanation:
I hope that this helps, if you have anymore questions, please, feel free to ask. I hope that you have an amazing rest of your day. ;D
Cookies that remain on your device indefinitely are called persistent cookies.
What are persistence cookies?Cookies that remain on your device indefinitely are called persistent cookies.
These cookies are stored on the user's device even after the browser is closed, and can be used to track the user's activity over time.
We have,
Persistent cookies:
It can be useful for storing information such as login credentials or user preferences, as they allow the user to remain logged in or have their preferences saved between browsing sessions.
However, they can also be used for tracking and advertising purposes, which has raised concerns about online privacy and security.
Many web browsers offer options for managing cookies, including the ability to delete or block persistent cookies.
Users can also use browser extensions or privacy tools to control how cookies are used on their devices.
Thus,
Cookies that remain on your device indefinitely are called persistent cookies.
Learn more about persistent cookies here:
https://brainly.com/question/29608733
#SPJ5
You have a 7 GHz dual core processor. How many decisions can the processor
make in one second? *
PLEASE HELP 10 points
Draw a logic gate circuit for each of the following Boolean expressions.
1- F= AB’
2-F = A’ + (B*C)
3-F= (A*B) + (A*C)
Answer:
can you explain more please I didn't understand
rocks created from compaction and cementation of sediments are called:
Answer:
Sedimentary Rocks
Explanation:
Sedimentary rocks are essentially the Frankenstein monsters of the rock world. They're made up of pieces of igneous and metamorphic rocks, sand, clay, and other sedimentary rocks.
Answer:
A sedimentary
Explanation:
hope this helps please mark as brainliest
Order the steps to describe how to import a contact list in Outlook 2016.
Answer: above is correct
In Backstage view...
Click Import/Export
Choose Import from...
Select CSV format...
Choose a destination....
Explanation:
The steps followed to import a contact list in the Microsoft Outlook 2016 are:
In background view, click open and export.Click import/ export.Choose import from another program.Select CSV format, and browse for a file list.Choose a destination folder, and click Finish.What is Outlook 2016?The Microsoft Outlook 2016 is a software system that helps the users to manage their personal information. There are various functions of outlook such as manage emails, contact managing, journal logging and many more.
The Microsoft outlook allows the user to import the contact list into their personal computer by following the steps as mentioned above.
Learn more about Microsoft Outlook , here:
https://brainly.com/question/26695071
#SPJ2
what is the answer ??
= Option b Minicomputer ..........
Answer:
Minicomputer answer The HP 2100 is a series of 16-bit minicomputers that were produced by Hewlett-Packard (HP) from the mid-1960s to early 1990s. Bro please follow me we should help each other
What is the maximum number of guesses it will take to find a number between 1 and 1000? Explain your answer.
Answer:
The maximum number of guesses without binary search is 999 since we would be going sequentially and guessing the numbers. When we reach number 999 and find that is not the answer, we know it has to be 1000, and don't have to guess, so the number of max guesses is 999.
The maximum number of guesses to find a number between 1 and 1000 is 10, using a binary search algorithm. Each guess divides the search range in half until the number is found.
Given that,
The number we are trying to find is between 1 and 1000.
We are trying to determine the maximum number of guesses it would take to find this number.
To find the maximum number of guesses it would take to find a number between 1 and 1000, we can use a binary search algorithm.
In a binary search, we start by guessing the middle number, which in this case would be 500.
If the number we are looking for is higher than 500, we then guess the middle number between 501 and 1000, and so on.
If it's lower, we guess the middle number is between 1 and 499, and so on.
Using this approach,
As dividing the problem in half with each guess. Since we have 1000 possible numbers and we divide by 2 with each guess,
It would take a maximum of log base 2 of 1000 (or approximately 9.97) guesses to find the number.
Therefore, we can conclude that the maximum number of guesses it would take to find a number between 1 and 1000 using this binary search algorithm is 10.
To learn more about number system visit:
https://brainly.com/question/33311228
#SPJ3
you type out a few sentences in an ms word file, and save it on your desktop. how is this data stored in the computer?
When one is typing on MS word and one save the file, this data would be stored as combination of 1s and 0s in the computer.
Computer data storage can be regarded complex system, immediately a data is saved then; The first be converted to simple numbers of 1s and 0s , this number are very easy for a computer to store and these number are regarded as Binary Numbers and all letters as well as photographs are converted to numbers, The hardware will record this saved numbers inside the computer. These numbers are then organized and transferred to temporary storage which be manipulated by programs, or software.Therefore, data are been stored as 1s and 0s in the computer.
Learn more at:https://brainly.com/question/21571591?referrer=searchResults
if you could travel back in time where would you go? what would you do? explain
Answer:
I would challenge the temporal paradox.
Explanation:
A temporal paradox, time paradox, or time travel paradox is a paradox, an apparent contradiction, or logical contradiction associated with the idea of time and time travel.
qbasic program to check whether the given number is odd or even
Answer:
CLS
INPUT "Enter a Number: ", n
IF n MOD 2 = 0 THEN
PRINT "Input Number is Even"
END IF
IF n MOD 2 = 1 THEN
PRINT "Input Number is Odd"
END IF
END
Explanation:
CLS
INPUT "Enter a number:",N
IF N MOD 2=0 THEN
PRINT "given number is even"
ELSE
PRINT"given number is odd"
END IF
END
how can a robot differentiate between positive or negative product reviews?
Answer:
Some of the sites have the rating system for example 3 stars, or the bot has a feature that can capture keywords that include a list of possible indicator that it is a negative review. For example if a user review includes a word "bad" or "horrible" the bot will flag that as a negative review.
Please give brainliest.
which type of broadband internet offers connections nearing the speed of light?
Answer:
FiberOptic connections
Explanation
One of the fastest data transfer methods for computers.
The type of broadband internet that offers connections near the speed of light is fiber-optic. The correct option is c.
What is fiber-optic?Information can be sent from one location to another via optical fiber. Communications over the internet, cable television broadcasts, and telephone calls all use it.
Data transmission through the internet is one typical application. Most likely, a fiber optic cable connecting my computer and Brainly's servers to your browser allowed it to obtain this webpage.
Fiber optics is used in communications, medicine, optical inspection, lighting, and in the making of sensors. The Internet is a connection of computers from different places without wires. It is transferring information.
Therefore, the correct option is c. fiber-optic.
To learn more about fiber-optic, refer to the link:
https://brainly.com/question/10062531
#SPJ2
The question is incomplete. Your most probably complete question is given below:
Cable.
DSL.
fiber-optic.
satellite.
a falsh movies consist of how many frame?
A mouse that emits and sense light to detect its movement is called an _______________ mouse.
what information most likely presents a security risk on your personal
An information which most likely presents a security risk on your personal social networking profile is: personal e-mail address or password.
A social networking profile can be defined as a database that contains information about the social characteristics and some personal details of an individual on social media websites.
Some of the social characteristics and details of an individual that are shared on social media websites include the following:
Date of birth.Occupation.Religion.Gender (sex).Location.Friends.However, you should not share your personal e-mail address or password on any social media websites because with such information your social media account can be accessed by an attacker or a hacker.
In conclusion, personal e-mail address or password is a sensitive information that must never be shared on a social media website in order to avoid compromising the safety or security of your personal social networking profile.
Read more: https://brainly.com/question/21765376
what feature is required to track customer search terms on a website?
Answer:
Site Search feature is required to track customer search terms on a website..
Explanation:
Hope it helps you..
Your welcome in advance..
(ㆁωㆁ)
Who, in 1937 tried to build a computer with no gears, cams, belts, or
shafts?
Answer:
But we're getting ahead of our story. One of the earliest attempts to build an all-electronic (that is, no gears, cams, belts, shafts, etc.) digital computer occurred in 1937 by J. V. Atanasoff, a professor of physics and mathematics at Iowa State University.
Explanation:
hope this will help you
have a great day
please mark me as the brainliest
Answer: Atanasoff
Explanation: he was a doctor whom tried to built a computer to test the capacity of storing data
Consider the following declarations:
class bagType
{
public:
void set( string, double, double, double, double);
void print() const;
string getStyle() const;
double getPrice() const;
void get( double, double, double, double);
bagType();
bagType(string, double, double, double, double);
private:
string style;
double l;
double w;
double h;
double price;
};
bagType newBag; // variable declaration
Requried:
a. How many members does class bagType have?
b. How many private members does class bagType have?
c. How many constructors does class bagType have?
d. How many constant functions does class bagType have?
e. Which constructor is used to initialize the object newBag?
Answer:
12, 5, 2, 3
bagType
Explanation:
I just did it
how much did netflix pay dave chappelle for the closer
did someone really hang themselves on wizard of oz
Answer:
Yes they did
Explanation:
If you look closely in the back, in the part where they sing where off to see the wizard the wonderful wizard of oz. Just look behind dorothy's head and you will see a man hanging himself
The light in a room must be turned on when there is one or more person in the room and turned off the rest of the time. A sensor is used to detect if there is someone in the room. Describe the use of a microprocessor to control the light in the room.
Answer:
ZOO WEE MAMA
Explanation:
ZOO WEE MAMA 23
Which device do you think is the most important in the development of human civilization
Answer: The most important characteristic for the development of a civilization is the presence of advanced cities because they were centers of trade, which established economies and allowed for further development of the civilizations.
Explanation:
Your welcome :)
what must you ensure if your work involves the use of different types of smart card security tokens
Answer:
Avoid a potential security violation by using the appropriate token for each system.
A_______VPN connection is a private network that uses a public
network to operate.
A)Point-to-Point
B)Point-to-Tunnel
C)Point-to-Site
D)Site-to-Site
Answer:
letter c. point to site po sagot diyan
Which TWO are examples of the internet reducing the use of paper?
Answer:
Using word documents instead of paper can save lots of paper especially, when lots of people are doing that already. Using emails can reduce the amounts of letters being sent to people.
Why do we collect feedback on the code we write?
Answer:
to improve our code
Explanation:
"To improve our code" we collect feedback on the code we write.
Collecting feedback helps the users to learn whatever your consumers think approximately company reputation, performance, as well as merchandise or their items.Going beneath their basic likes as well as their dislikes and assisting you in understanding and evaluating wherever you may grow and where the business position in comparison to your competition.
Thus the above answer i.e., "option a" is correct.
Learn more about feedback here:
https://brainly.com/question/1603365
Research This: Which apps are available for your smartphone to erase data remotely? Which location-
tracking apps allow you to take a photo of the thief and then send an email message that contains the image
to you automatically? If your device is lost and you file a police report, you will need the device's serial
number. Locate that number now and write it on a piece of paper. Also, locate the phone's 15-digit
International Mobile Equipment Identity (IMEI) number and record that number. Store the document with
these two numbers in a secure location. In addition, research the efforts by the U.S. Federal
Communications Commission (FCC) and the Cellular Telecommunications Industry Association (CTIA) to
create a centralized database of lost and stolen mobile phones. What is the status of this database? What
legislation has been proposed or passed that requires wireless carriers and phone manufacturers to develop
technological solutions that can curb the growing problem of violent smartphone theft?
Answer:
OOP TY!
Explanation:
TY
Draw a flow chart showing the conversion of temperature from farenheit to degree celsius
I hope this answers help you
Tim has joined a new firm as a network engineer. Which three personal qualities will help him in his career? A. open-mindedness B. flexibility C. willingness to learn D. confidentiality E. ethnicity
Answer:
I would say A B and C
Explanation:
A) the Operating system is said to provide security. Explain what this means and give an example of a security feature.
It means that thw operating system is up to date with all the lastest protection systems like an anti virus. An example is that the operating system has a built in ransomware protection system ib place.
Hope this help please give the brainliest award