1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NNADVOKAT [17]
2 years ago
14

Interactivity and Blank______ are two important capabilities of the Internet in the Blank______ relationship.

Computers and Technology
1 answer:
ANTONII [103]2 years ago
4 0

Interactivity and individuality are two important capabilities of the Internet in the buyer-seller relationship.

<h3>What is  individuality?</h3>

The Definition of the term individuality connote the full character that is specific to and set apart a person from another.

Note that Interactivity and individuality are two important capabilities of the Internet in the buyer-seller relationship.

Learn more about individuality from

brainly.com/question/18405002

#SPJ1

You might be interested in
GUI allows users to communicate with a device and see what they are doing onscreen.
zloy xaker [14]
The answer is true.
Gui basically is the thing that lets you see your desktop and what your doing. The G means graphics. Makes sense. If we didn't have GUI, then we would have to type in code to access documents, and do things on the computer. GUI changes that.
8 0
3 years ago
The small flash memory used in<br>protable device like Laptop<br><br>​
xxMikexx [17]

Answer: flash drive

Explanation:

Flash drives are refered to as small, portable storage devices which makes use of a USB interface in order to be connected to a laptop.

Flash cards are removable and rewritable. They are mainly used to store data. Flash cards can be found in computers, laptops, digital cameras etc.

4 0
3 years ago
How many passes will it take to find the four in this list?
earnstyle [38]

Answer:

3 is the correct answer

I got correct on my test

7 0
3 years ago
Read 2 more answers
Explain the concept of risk management, including risk identification, assessment, and control.
abruzzese [7]

Answer:

Risk management is the technique that is used for managing the risky situation so that security of the system or organization can be maintained. The risk can be reduced by parameters like monitoring the system,alertness, preventive measures etc. There are terms related with the risk management for prevention of the risk such as risk control ,risk identification and risk assessment .

  • Risk control is the method that is used for calculating the loss or damage experience and then taking the correct measures to reduce the loss and thus, controlling the risk.
  • Risk assessment is the analyzation of the threats and source of damage/loss that is caused or can be caused by assessing the whole process and functioning.
  • Risk identification is the technique through which the threat is listed over a document and sorted in accordance with the category of risk, risk response etc.  

7 0
4 years ago
Which of the following can be used to locate data in a particular column?
dangina [55]

Answer:

A. VLOOKUP

Explanation:

VLOOKUP is an Excel function to look up data in a table organized vertically. VLOOKUP supports approximate and exact matching, and wildcards (* ?) for partial matches. Lookup values must appear in the first column of the table passed into VLOOKUP.

Purpose 

Lookup a value in a table by matching on the first column

Return value 

The matched value from a table.

Syntax 

=VLOOKUP (value, table, col_index, [range_lookup])

Arguments 

value - The value to look for in the first column of a table.

table - The table from which to retrieve a value.

col_index - The column in the table from which to retrieve a value.

range_lookup - [optional] TRUE = approximate match (default). FALSE = exact match.

4 0
3 years ago
Other questions:
  • Which social media marketing concept engages visitors, getting them to revisit your website and tying them to offline events for
    7·2 answers
  • Criminal Investigation people called my house on an automated voice is this a scam ??
    13·1 answer
  • Write a program reverse-order.cpp which asks the user to input two dates (earlier date then later date). The program should repo
    13·1 answer
  • Mathematical expression that might link numbers in cells
    14·1 answer
  • Select the correct answer
    14·1 answer
  • Tgif
    7·1 answer
  • Jeri wants to make sure she designs her web site for a specific group of people. What will help her plan who will visit the site
    8·2 answers
  • There are many reasons to convert to the decimal numbering system. Select the best answer. When checking numeric values in compu
    5·2 answers
  • Draw a flow chart to access the marks of three students. calculate the total avarage and display the result​
    11·1 answer
  • can you guys plz answeer this i need help rrly bad and plz no viruses or links or answers that have nun to do with this
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!