1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OLga [1]
2 years ago
12

Which sentence uses parallel structure correctly?

Computers and Technology
1 answer:
Archy [21]2 years ago
3 0

Answer: Correct option is Option D.

Explanation:

Processed foods are bad for you, are high in fat, and are the cause of serious health issues.

Parallel structures are those structures where words are used in same pattern in a sentence to show that two given ideas/phrases are of similar significance.

This sentence uses parallel structure correctly.

Parallel structure in the sentence are -

are bad for you

are high in fat

are the cause of serious health issues

You might be interested in
In total, how many 8-bit registers are there in the Intel 80x86 CPU design presented in class? Name one of these 8-bit registers
RSB [31]

Answer:

In general the number of  bit registers in Intel 80x86 CPU design when combined together forms a 16 - bit register

An example of the  -bit registers are AH, AL, BH, BL, CH, CL, DH, and DL

Explanation:

Solution

The 8086 CPU design has a total of eight 8-bit registers and these register can be integrated together to make 16- bit register as well.

The 16-bit data is stored by breaking the data into a low-order byte and high order byte.

The name of the 8 bit registers is shown below:

AH, AL, BH, BL, CH, CL, DH, and DL

7 0
2 years ago
Peter is working on a project. He feels that the parameters need to be changed to meet the client specifications. First he must
11111nata11111 [884]

Answer:

C) chain

Explanation:

Small group network comprises of a vertical, direct, chain, all channel and box network

The vertical network is a network that is made for some specific purpose or goal of the business organization.

The direct network is a network that is directly interrelated to each other.

The chain network is that network in which the formal chain of command follows through which proper  communication can be done in all the departments without any barriers to a communication network

It also shows that each member can communicate the person below and above their position only in a vertical hierarchy. It follows the top-down approach

This all channel network follows an informal communication network through which anyone can communicate with anyone at any time with following any chain of the business organization

The box network covers all the things in one network. Like -  various software, packages, etc

In the given case Peter is asking permission from the supervisor and supervisor is discussing with the department director, is showing the formal chain of command that's why according to the given scenario the most appropriate answer is chain network.

8 0
3 years ago
Look at the top 3 banking activities done via mobile banking vs. online banking. What characteristics do you notice for both?
muminat

Answer:  <em>The biggest difference between the two is their functionality. Internet Banking allows you to conduct online transactions through your PC or laptop and an internet connection. On the other hand, mobile banking can be done with or without internet. Many banks nowadays have their mobile apps for mobile banking.</em>

Disadvantages of Mobile Banking

<em>If the customer does not have a smartphone than the use of Mobile Banking becomes limited. A transaction like transfer of funds is only available on high-end phones. Regular use of Mobile Banking may lead to extra charges levied by the bank for providing the service.</em>

<em />

Explanation: <u><em>Was this helpful to you? if so please put me Brainlyest.</em></u>

4 0
3 years ago
What should you call a person who has permission to bypass the security of a computer to access it
Sav [38]

Answer:

Administrator

Explanation:

Such permission to bypass the security of a computer to access it is being given to only the administrator. No other user is allowed to have such privileges. And there is only one administrator in a team, and this is the standard as only then the security of a network of computers, and a particular computer can be ensured. And the correct answer to this question is certainly the Administrator.

7 0
2 years ago
The term citizenship means that citizens in a country:
zimovet [89]

Answer:

Its B.

Explanation:

I think

5 0
3 years ago
Other questions:
  • Fred opens a web browser and connects to the www.certskills.com website. Which of the following are typically true about what ha
    10·1 answer
  • The component that allows you to make a paper-based copy of a body of text is the _____.
    12·1 answer
  • __________ was the first operating system to integrate security as its core functions.
    15·2 answers
  • Intro to cs 3.7 edhesive g=float(input("Enter your English test grade:")) if(g&lt;=64): print("F") if (g&gt;=65 and g&lt;69): pr
    11·1 answer
  • Using the notation exemplified in following question , list a set of tables and attributes (and identify keys) to represent the
    10·1 answer
  • which of these describe raw data?check all of the boxes that apply A) what a person buys B) where a person lives C) data that ha
    9·1 answer
  • Assume that input file references a Scanner object that was used to open a file. Which of the following while loops shows the co
    6·1 answer
  • Sally needs to teach her class how to convert a decimal number to a binary number. What is the first step she should take to sta
    5·1 answer
  • A slide titled Alexander Graham Bell. There are 6 bulleted entries on the slide, and there is a lot of text on the slide. There
    11·2 answers
  • Describe four traditional tehniques for collecting information during analysis.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!