1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maurinko [17]
3 years ago
15

Synthesizing information can be done by creating

Computers and Technology
2 answers:
devlian [24]3 years ago
6 0

Answer:

D. All of these

Explanation:

On edgenuity 2020

Maurinko [17]3 years ago
4 0

Answer:

D

Explanation:

because you use all of those

You might be interested in
Choose all that apply.
stiks02 [169]

Answer:

choose all that apply

Explanation:

7 0
3 years ago
What are the four different orchestral instrument families?
natka813 [3]

Answer:

Gutair

Violen

cello

Double Brass

Harp

Explanation:

7 0
3 years ago
Read 2 more answers
What are some benefits that each computer system being used?
lisabon 2012 [21]

Answer:

Computerised accounting systems have numerous benefits to them and below are the top nine points as to why you should be using them with your business.

Automation. ...

Data Access. ...

Accuracy. ...

Reliability. ...

Speed. ...

Security. ...

Scalable. ...

Visuals.

Explanation:

hope this helps!

6 0
2 years ago
Read 2 more answers
Jack was drinking a glass of water near his computer when his dog bumped his arm, spilling water on his keyboard. What is the fi
Anvisha [2.4K]

Answer:

4no. is the answer may be

3 0
2 years ago
Read 2 more answers
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
2 years ago
Read 2 more answers
Other questions:
  • For some brand-name computers, the hard drive contains a partition that can be used to reinstall windows. what is the name for t
    6·1 answer
  • Explain the role of the domain name system
    15·1 answer
  • write a method that will return a person's age entered by keyboard. You will need to include at least one instance variable in t
    11·1 answer
  • What kind of server connects a remote system through the internet to local serial ports using tcp/ip?
    9·1 answer
  • List the five parts of a system.describe them.
    13·1 answer
  • What should you do to organize a large amount of data??
    10·1 answer
  • Suppose Host A wants to send a large file to Host B. The path from Host A to Host B has three links, of rates R1 = 500 kbps, R2
    14·1 answer
  • Two technicians are discussing a parasitic load test. Technician A says that the parasitic load is measured with an ammeter Tech
    13·1 answer
  • Write a Python3 program to check if 3 user entered points on the coordinate plane creates a triangle or not. Your program needs
    12·1 answer
  • Please HELP me it a test and it due rn. Please no links
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!