1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
3 years ago
15

Can someone help me with this question please ​

Computers and Technology
1 answer:
Vaselesa [24]3 years ago
6 0

Answer:sorry bro

Explanation:

sorry brp

You might be interested in
The three of hazards<br>​
Paul [167]

Answer:

Please be more specific

Explanation:I take digital technology information so I might be able to help you.

6 0
3 years ago
Carla wants to add the existing field "Order ID Number" to an Access form. Which steps will allow her to complete
lubasha [3.4K]

Answer:

in the Design section, select the Form Design Tools tab → select Add Existing Fields — drag and drop the field

"Order ID Number" into the form

Explanation:

I just took it

5 0
3 years ago
DESCRIBE THE GENERAL STRATEGY BEHIND DEALOCK PREVENTION AND GIVE A PRATICAL EXAMPLE
Sophie [7]

Answer:

........

Explanation:..........

3 0
3 years ago
The IV tubing and hub connection site should be left free of tape and uncovered from the dressing so that it can be visually ins
ra1l [238]

Answer:

True

Explanation:

Based on the information provided within the question it can be said that this statement is completely True. The IV tubing and hub need to be easily accessible and able to be visually inspected at all times since all liquids, including medicine enter the patients body through the IV line. Therefore any blockage or error can be life threatening and the problem in the tubing or hub need to be detected immediately and solved, which is why all IV equipment is transparent.

3 0
3 years ago
What command would you use to map a share to a drive letter on a computer?
natulia [17]
What are the options
4 0
4 years ago
Other questions:
  • Darnell is preparing to read A Rocket to the Stars for class. What might he predict based on the title?
    6·2 answers
  • Assume that you have an array of integers named arr. The following program segment is intended to sum arr [0]through arr[n−1], w
    7·1 answer
  • I have a bag of trail mix.half of the bag contains peanuts.1/4of the bag is chocolates candies, and 1/4of the bag is dried fruit
    12·2 answers
  • A top-notch IT company is seeking an experienced leader to direct a team of experts in the development, creation, and modificati
    14·2 answers
  • Suppose that your application uses a loop that isn't producing the intended results. The best way to analyze what’s going on in
    13·1 answer
  • How many suggestions available in correcting misspelled words<br>​
    11·1 answer
  • From a neural network with 11 input variables, one hidden layer with three hidden units, and one output variable, how many param
    7·1 answer
  • Does technology always follow the science, yes or no and explain the reason your choice
    8·1 answer
  • Cybersecurity is defined as the set of techniques to protect the secrecy, integrity, and availability of computer systems and da
    7·1 answer
  • An IT Manager is reviewing the company’s approach to data privacy for a new project. What can happen if the company does not col
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!