1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
3 years ago
11

To become a news anchor, you should get a Bachelor's degree in:

Computers and Technology
2 answers:
Sveta_85 [38]3 years ago
7 0

Answer:3

Explanation:

sp2606 [1]3 years ago
6 0

Answer:3

Explanation:

You might be interested in
On the line below, write the two places you can control tab settings.
nikklg [1K]

The two places you can control tab settings are the  ruler and in the dialog box.

<h3>What are setting tabs?</h3>

The Ctrl + Tab is one that is often referred to as Control Tab and C-tab or the Ctrl+Tab.

It is known to be a keyboard shortcut that is said to be most often used to chose between open tabs in a browser.

Note that the settings Tabs are said to be a kind of paragraph-formatting tool that is often used to align text.

Hence, The two places you can control tab settings are the  ruler and in the dialog box.

Learn more about control tab settings from

brainly.com/question/11509892

#SPJ1

See full question below

Where can’t you control tab settings? Check all the apply

On a ruler

In a dialog box

In the mini toolbar

In the paste special options

4 0
1 year ago
Horizontal lines should be avoided in photographs t/f
Temka [501]
I belived its true is the answer
3 0
3 years ago
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
mars1129 [50]

Answer:

B. Symmetric key encryption

Explanation:

Symmetric key encryption is one in which a single encryption key is sent to the receiver so both sender and receiver share the same key. In this type of encryption, the sender uses a particular key to encrypt the data and sends the encrypted data (cipher data) to the receiver and then the receiver uses the same key to decrypt the data.

Public key encryption, or asymmetric encryption uses two keys - a private key and a public key. The public key is know to everyone while the private key is known only to those for whom the message is intended. An application of this type of encryption is in SSL (Secure Sockets Layer) -  a protocol for transmitting data privately on the internet.

Private key encryption is not exactly one of the encryption methods but rather, a private key and a public key are used in encryption.

The best option is therefore <em>symmetric key encryption</em>.

<em>Hope this helps!</em>

7 0
3 years ago
Robert wants to start a mobile app development company that builds apps for both iOS and Android. He is researching different cr
kondaur [170]

Answer: phonegap and xamarin

Explanation:

phonegap and xamarin

6 0
3 years ago
What are two composite numbers that both have 8 as a factor?
Vinvika [58]
A composite number is a number that can be divided by a number other than one and itself.
Composite numbers with 8 as a factor:
16, 24, 32, 40, 48.
Choose two of the numbers.
6 0
3 years ago
Other questions:
  • Literacy is best defined as knowing how to: (Points : 1)
    7·2 answers
  • 18. When you turn off the power to a computer and unplug it at night, it loses the date, and you must reenter it each morning. W
    7·2 answers
  • An equation that performs a calculation is a formula. True or false quest
    9·1 answer
  • Match the item to the type.
    11·1 answer
  • How do users log into Windows 8?
    7·1 answer
  • Universal Containers has two customer service contact centres and each focuses on a specific product line. Each contact centre h
    7·1 answer
  • Ken has discovered that a vice president of his company has been using his computer to send data about a new product to a compet
    15·1 answer
  • Define power supply and types of power supply<br>​
    11·1 answer
  • Mavis is considering signing up for a hosted enterprise software solution for her small business. She recognizes that an advanta
    15·1 answer
  • How to give a file name as an argument in function in python.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!