1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAVERICK [17]
2 years ago
11

PLEASE ANSWER IN COMPLETE SENTENCES - JOURNALISM, 30 POINTS

Computers and Technology
2 answers:
Aloiza [94]2 years ago
7 0

Answer:

ok I'll HELP

Explanation:

its 3

Hope this helps!!!!!!!!!!!

Ivan2 years ago
7 0
Explanation is 3! Happy to help!
You might be interested in
Who was the first computer programmer ever?
coldgirl [10]


Ada lovelace was the first computer programmer ever


8 0
4 years ago
How do you close a document but keep the word processing program open?
Zielflug [23.3K]

You open a new tab for word then close a other document

7 0
3 years ago
Read 2 more answers
A place in memory who's contents cannot change while the program is running
maria [59]
Constant will be the answer
6 0
3 years ago
Write an expression whose value is the concatenation of the three str values associated with name1, name2, and name3, separated
enyata [817]

Answer:

name1 + "," + name2 + "," + name3 // concatenation of the three values

Explanation:

Following are the description of statement

  • The "+" operator is used for the concatenation purpose of the three str values.
  • In the given question the name1 variable contains "Neville" ,name2 contains  "Dean" and name3 contains "Seamus".
  • Firstly we have given the name1 after that give the comma then we use "+" for the concatenation purpose and give the name2 again we will comma and finally, we will give the variable name3 by using "+" operator.
6 0
3 years ago
Which Windows Server 2008 R2 version has a smaller footprint, reduces the number of security vulnerabilities, and does not inclu
stira [4]

Answer:

Server core

Explanation:

Server core is miniature Microsoft Windows server installation option with limited features, that mimic the features of an actual core server, with little servicing and management requirement, disk and memory, and attack vulnerability.

5 0
3 years ago
Other questions:
  • #Imagine you're writing a program to check if a person is
    8·1 answer
  • ________ is a method for addressing, creating, updating, or querying relational databases.
    9·1 answer
  • What three processor technologies are required to install windows 8?
    14·1 answer
  • Internally, computers are constructed from circuitry that consists of small on/off switches. What is the most basic circuitry-le
    12·1 answer
  • TRUE OR FALSE: If I ask you to span multiple rows in your table, that means that two columns will merge together
    5·1 answer
  • Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcast
    9·1 answer
  • Difference between batabse and database management system
    5·1 answer
  • Rudy accidentally sent a sensitive work report to a personal friend named James instead one of his co-workers, who is also named
    6·1 answer
  • write a method that returns a string in the form of hour:minute:second for a given total seconds using the following header: pub
    8·1 answer
  • What may occur if a forever loop generates data but does not delete it?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!