1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lemur [1.5K]
2 years ago
13

3. Find the best.

Computers and Technology
1 answer:
Tamiku [17]2 years ago
6 0

Answer:

1. is the answer

Explanation:

<h2>mark me as brainlest</h2>

You might be interested in
Many ____ classes for certification are available on the Internet and by many companies that have set up intranets within their
Marina86 [1]

Many <u>online training</u> classes for certification are made available for students on the Internet and by many companies that have set up intranets within their organizations.

Certification can be defined as a recognition that is given to an individual (student) for the completion of a specific course of study and passing an examination. Thus, it usually issued to certify that an individual is a professional in a particular course of study.

Some examples of certifications that are issued to an individual (student) include the following:

  • CCNA
  • Comptia A+
  • HSE I and II

In this context, many companies with intranet facilities within their organizations offer <u>online training</u> classes for certification by making them available for students over the Internet.

Read more on certification here: brainly.com/question/1391803

5 0
2 years ago
A __________ is typically stored in a JAR file and contains one or more packages that you want to make available to other projec
dsp73

Answer:

<u>class -files and auxiliary resources</u>

Explanation:

JAR stands for Java Archive which allows one to make multiple file bundles into a single file which is archive file and these JAR files contains in them the the auxiliary resources and the class files.

The archive file allows us to be storage efficient by compressing our data and files.

These files also allows us to transform our software into extensions as well.

For the enforcement of consistency of version of the packages, these files can be sealed optionally.

6 0
3 years ago
Draw a flowchart diagram for a program that displays numbers 1 to 20
madreJ [45]
Here you go plz mark brainlist
6 0
2 years ago
What type of malicious software tries to gather information about you without your consent?
AlekseyPX

Answer:

B-malware

Explanation:

I do tech and i help work on computars.

6 0
3 years ago
Special keys that allow you to use the computer to perform specific functions
Pavel [41]

Answer:

Examples are Ctrl, Alt, Fn, Alt Gr, Shift, Caps Lock, Tab, Scroll Lock, Num lock, Esc, Windows Key, Backspace, Enter...

8 0
3 years ago
Other questions:
  • _____ refer(s) to computer programs that provide instructions for a computer to execute a desired task. Answer .a.Software .b. I
    7·1 answer
  • A file must be ________ before data can be written to or read from it. closed opened buffered initialized none of these
    11·2 answers
  • An information system is the entire set of __________, people, procedures, and networks that enable the use of information resou
    8·1 answer
  • ) How many switching functions of two variables (x and y) are there?
    11·1 answer
  • When performing a basic search with Bing, you first type in your search expression and then click a button to begin the search;
    13·1 answer
  • You can apply several different worksheet themes from which tab?
    6·2 answers
  • A domain name is used to: *
    15·1 answer
  • LIST THE BEST 10 3D PRINTERS WITH THEIR RESPECTIVE APPLICATION SOFTWARES.
    5·2 answers
  • Cho lược đồ CSDL “Quản lý BÁN HÀNG” có các bảng như bên dưới. (Thuộc tính in đậm và
    7·1 answer
  • Greg is concerned about the use of ddos attack tools against his organization, so he purchased a mitigation service from his isp
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!