1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
posledela
1 year ago
9

HURRY PLS

Computers and Technology
1 answer:
gogolik [260]1 year ago
7 0

Answer:

the testing team

Explanation:

because even though she may have fulfilled the requirements but she still need to test if it runs perfectly or not

You might be interested in
What is the primary language used to write web content and is the default format for Outlook messages?
Doss [256]

Answer:

I think its plain text but I might be wrong

7 0
2 years ago
.9 What is Artificial Intelligence?
Serhud [2]
C because bread is not happy with you
8 0
2 years ago
A filing system in which an intermediary source of reference, such as a file card, must be consulted to locate specific files is
Jet001 [13]

correct me if i'm wrong and forgive me if i am wrong but it may or may not be A.

7 0
2 years ago
Read 2 more answers
How can security professionals use software to recover stolen laptops ?
inna [77]

<u>Answer is:</u>

E). They monitor email traffic.

<u>Explanation:</u>


Track Your Device's IP Address with mail. If your laptop or smartphone was stolen, you can use a service like mail to find the IP address of your thief. When you log into those services from any computer, it logs the IP address used, and displays your last used IP in your account. So, these are source for finding the stolen laptop and smartphones.

I hope you got the idea. Thanks

3 0
3 years ago
What is the maximum number of ip addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet
FinnZ [79.3K]
30 including the router.
7 0
2 years ago
Other questions:
  • A circuit contains three resistors connected in series. the value of r1 is 150 , the value of r2 is 60 , and the value of r3 is
    8·2 answers
  • Computer _____ begins with regular maintenance of the computer system such as firewalls, antivirus programs, defragmentation, de
    7·1 answer
  • Write a program that accepts three decimal numbers as input and outputs their sum​
    8·2 answers
  • Digital printing is not suitable for printing what
    11·1 answer
  • There are many modes of remote visual communication. which is the most common mode
    5·1 answer
  • 24/3*2^2/2*3+(20-10)-40
    9·1 answer
  • A computer has __________processing device
    13·1 answer
  • Please Answer Quickly.<br> Match the item on the left with the reason that it is false on the right.
    9·1 answer
  • Select one Layer 2 or wireless WAN technology presented in Lesson 3. Elaborate on its characteristics, pros and cons, and common
    13·1 answer
  • What are the two protocols used most often with iot devices? (select two. )
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!