1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lina2011 [118]
3 years ago
5

3. What type of error is in the following sentence? "George W. Bush is the President of the United States of

Computers and Technology
1 answer:
lana66690 [7]3 years ago
8 0

<u>Answer:</u>

<em>Punctuation</em>

<u>Explanation:</u>

The sentence started with <em>the double quotes and it should be closed appropriately.</em> All the single quotes and double quotes are paired punctuation and mostly they do not come alone.

Note that there is a <em>difference between a single quote and apostrophe</em> though same key is used from the keyboard for both. <em>The correct answer is  Punctuation.</em>

George W. Bush is the President of the United States of America”. There is one another error in the statement. At present Bush is not the President so the sentence can be <em>George W. Bush was the President of the United States of America.</em>

You might be interested in
How the data is converted into the information?​
leonid [27]

Answer:

the data is converted into information by data processing

7 0
3 years ago
Read 2 more answers
Which of the following safety and privacy features is not included in a P2P app or service?
diamong [38]

The option that should not be included in the safety and privacy features is not included in a P2P app or service is the non-inclusion of Representative call for confirming payments over $100.

<h3>What is P2P application?</h3>

This is known to be a form of Peer-to-peer payment services. They are apps or application that has its features which helps one to be able  to  to send money to other people.

Conclusively, a Representative call that is made for confirmation of payments that is over $100 should not be included as people may use this kinds of call to defraud other people.

Learn more about privacy features  from

brainly.com/question/20533576

3 0
2 years ago
Read 2 more answers
To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwi
serg [7]

Answer:

True

Explanation:

BSA (The Software Alliance), styled as "BSA | The Software Alliance," is a trade group founded by Microsoft in 1988 that attempts to eliminate software piracy of the software made by its members. Many major software makers are part of the BSA, including Adobe, Apple, Autodesk and Oracle, among others.

6 0
3 years ago
Quality, personal attention, leadership, and respect are examples of what?
tankabanditka [31]
A good employee, everything u named is a good example of a good employee
8 0
3 years ago
Read 2 more answers
Please help me with this question ​
Anna35 [415]

Answer:

for this, u will have to put what u already know into a few stanzas and turn it in. hope this helps.

7 0
3 years ago
Other questions:
  • Into which of these files would you paste copied information to create an integrated document?
    13·2 answers
  • Spreadsheet software creates a ____, composed of a grid of columns and rows
    6·1 answer
  • Assume that the string oldSeq has been properly declared and initialized and contains the string segment. Write a code segment t
    6·1 answer
  • John is runnig his Database application on a single server with 24 Gigabytes of memory and 4 processors. The system is running s
    6·1 answer
  • Cómo se transmite la voz en el sistema telefónico?
    12·1 answer
  • PLZZZZZZZZZZ HELP ME OUT THIS DUE TODAY AND NEED SOMEONE HELP!!!!!plzzzzzzzzzzz i begging you!!!
    11·1 answer
  • Does anybody know how to get this little search bar thing off of my task bar on a HP laptop.
    12·1 answer
  • Write a program to compute the maximum and minimum value of three numbers:
    10·1 answer
  • In addition to reduced power consumption, what is an advantage of using hyperscale cloud computing data centers?
    8·1 answer
  • ________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!