1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
2 years ago
6

Maia is typing her report on meerkats for her biology class.

Computers and Technology
1 answer:
dem82 [27]2 years ago
4 0

Answer:

         

Explanation:

You might be interested in
3 Points
tino4ka555 [31]

Answer:

its B the person in the comments were right

Explanation:

took an edge test

6 0
3 years ago
You are reviewing the style sheet code written by a colleague and notice several rules that are enclosed between the /* and */ c
Flauer [41]

Answer:

Nothing will happen.

Explanation:

The rules written between /* and */ will be ignored because /* and */ are the standard way of writing comment in a style sheet code. So, whatever fall in between them will be ignored during rendering of the page.

7 0
3 years ago
Mrs. Patel uses a computer program to balance her checkbook. Which of the following best explains how the
Alexandra [31]

Answer:

c it reduces errors

Explanation:

Instead of Mrs.Patel doing it she has an online program made for checks to do it for her.

6 0
3 years ago
What year did bill gates form traf-o-data?
alexgriva [62]

In 1972 Bill Gates formed Traf-O-Data.

8 0
3 years ago
When would it be necessary to shoot in 4K according to the presentation?
Nataly_w [17]

Answer:

because it provides you a lot of storage and the post production equipment to handle it and it is used to do big projects

Explanation:

so l know this much it is correct please mark me brainllest

6 0
2 years ago
Other questions:
  • Which of the file names below follows standard file naming convention
    13·1 answer
  • Change control in application development is a formal process for changing written documentation into online documentation, and
    13·1 answer
  • You have users who connect to the corporate network using their laptops. because these computers often access confidential data,
    9·1 answer
  • How many questions must you answer in Brainly to be able to message people?
    6·2 answers
  • A(n) file management system is a program that allows the creation of individual database tables, each of which is stored in its
    5·1 answer
  • Which is a copyright
    5·1 answer
  • How can you autohide the taskbar in Windows 10?
    8·2 answers
  • While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating
    8·1 answer
  • A character with the point size of 10 is about 10/72 of once inch in height
    8·1 answer
  • Which type of protocol allows for a secure data transmission using encryption methods?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!