1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masteriza [31]
3 years ago
9

What's a common mistake that young people in relationships make?

Computers and Technology
1 answer:
allochka39001 [22]3 years ago
3 0
B, i say b because oversharing something personal could result in somebody you thought you loved going back telling someone else, causing rumors to be spread out
You might be interested in
Five routers are to be connected in a point-to-point subnet. between each pair of routers, the designers may put a high-speed li
Natalija [7]

Let assume are lettered A to E in that order. Thus, there will be 10 potential lines: AB, AC, AD, AE, BC, BD, BE, CD, CE and DE. Each of these potential lines has 4 possibilities. Therefore, the total number of topologies is 4¹⁰=1,048,576. 1,048,576. At 100ms <span>it will take 104,857.6 seconds which is slightly above 29 hours to inspect each and one of them.</span>











6 0
3 years ago
Ann, a customer, purchased a pedometer and created an account or the manufacturer's website to keep track of her progress. Which
PIT_PIT [208]

Answer:

The technologies that Ann will MOST likely use to connect the pedometer to her desktop to transfer her information to the website are:

a. Bluetooth

and

c. NFC

Explanation:

Bluetooth and NFC (Near Field Communication) are wireless technologies that enable the exchange of data between different devices.  Bluetooth operates on wavelength.  NFC operates on high frequency.  The security of NFC over Bluetooth makes it a better tool of choice.  NFC also operates on a shorter range than Bluetooth, enabling a more stable connection. NFC also enjoys a shorter set-up time than Bluetooth.  It also functions better than Bluetooth in crowded areas.  Tethering requires the use of physical connectors.  Infrared is not a connecting technology but wave radiation.

6 0
3 years ago
How do computer users benefit from the increased speed?
erma4kov [3.2K]

Answer:

jrjhfn4

Explanation:

jejehrurjrbrr

7 0
3 years ago
9.5 Code Practice edhesive
Ann [662]

Answer:

a = [[34,38,50,44,39],

    [42,36,40,43,44],

    [24,31,46,40,45],

    [43,47,35,31,26],

    [37,28,20,36,50]]

   

sum=0

for r in range(len(a)):

   for c in range(len(a[r])):

       sum = sum + a[r][c]

       

       

print("Sum of all values: " + str(sum) + "\n\n")

print("Average of all values: " + str(sum / (len(a) * len(a))))

Explanation:

I got 100%.

3 0
3 years ago
Read 2 more answers
Andrew frequently uses bullet points and numbered lists in his presentation to _____.
seraphim [82]

Hey there!


Andrew likely does this to convey a <em>point </em>easily. Bullet points offer a way to explain a topic, but in simple sentences that when all add up, explain it. They're meant to be short and sweet, and don't make the reader lose their attention.


Hope this helps!

5 0
4 years ago
Read 2 more answers
Other questions:
  • Boosting morale in a workplace through reorientation is accomplished by giving employees _____. a. snacks and drinks b. the same
    15·2 answers
  • The wires that transfer data across the motherboard are known as the
    9·1 answer
  • A Uniform Resource Locator (URL) consists of three separate parts: network protocol, host, and web browser.
    11·2 answers
  • What does server manager utility do
    7·1 answer
  • 15 points
    5·2 answers
  • The appropriate software to use for creating research papers is ________ software. Select one: A. presentation B. word processin
    15·1 answer
  • Application software definition word excel powerpoint microsoft
    13·1 answer
  • Wireless data networks are particularly susceptible to known ciphertext attacks.
    10·1 answer
  • Which best describes the Help feature of Word?
    13·2 answers
  • This is my paragraph . The type of color is ude in this code line is ..............................
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!