1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleks [24]
3 years ago
15

This information is generally included on a fax cover sheet.

Computers and Technology
1 answer:
SVEN [57.7K]3 years ago
7 0

Answer:

You should include your name, the fax number and your regular phone number. You should add the same information for your recipient. Please tell me if i got this right. :D

You might be interested in
How to get off of supervised user
Serhud [2]

Answer:

On the Chromebook sign-in screen, select the profile you want to remove. Next to the profile name, select the Down arrow . Select Remove this user.

hope this helps

have a good day :)

Explanation:

4 0
2 years ago
Select the correct answer.
Alex

To my thinking:

If it's a humanlike AI- then her phone will speak like we speak (english and other languages) also will talk how we talk (slang and will think what is the answer is based on the problems like right now the virus, everyone thinks we going to be stuck indoors forever so the AI will think that too)

if it's a non-humanlike AI- then the AI will be like -beep beep- (and say things that the users does’t understand )

if it's a weak AI- then it would be limited or use any info, expecting the user to find it out

if it's a strong AI- then it will answer things like as there sure what they said is an answer. like a educated guess

if it's a true AI- then it will have all the answers right, no matter if the AI looked it up or not

so to my thinking- I have Siri (iPhone) and when I see the answers to see what my AI is, then I would have picked answers A and E. But if I have to chose one then I'm am going with E.

4 0
3 years ago
What feature preserves your open apps and data, but allows another user to log in to his or her own session of the same computer
Hitman42 [59]

A feature that preserves open apps and data while allowing another user to log in to his or her own session of the same computer is: switch user.

<h3>What is a computer?</h3>

A computer is an electronic device that is designed and developed to receive data from an end user in its raw form (input) and processes these data into an output that could be used for other purposes.

Generally, all computers are designed and developed with a feature called switch user, so as to preserve open software applications and data while allowing another user to log in to his or her own session of the same computer simultaneously.

Read more on computer here: brainly.com/question/959479

6 0
1 year ago
Only Lysita knows the password for the question......
emmasim [6.3K]
The correct answer is 1234.

7 0
3 years ago
Design a circuit that will tell whether a given month has 30 days in it.
Ipatiy [6.2K]

The simplified equation is given as Y=A_3A0+A3A0. To draw the circuit diagram using a minimum number of gates we use this equation and the x^2 equation to form the truth table. This is further explained below.

<h3>What is a circuit?</h3>

Generally, a circuit is simply defined as a full circular channel via which electricity travels in electronics. A power flow, terminals, and a drain make up a basic circuit.

In conclusion, The circuit will need 4 inputs to produce 16 combinations in order to determine if the month contains 31 days. At 4 inputs, there are 12 inputs required. the

Hence,we use this information and the x^2 equation to form the truth  table

the Equation is given as

Y=A_3A0+A3A0

Read more about  circuit

brainly.com/question/27206933

#SPJ1

6 0
2 years ago
Other questions:
  • Write a program that asks for 'name' from the user and then asks for a number and stores the two in a dictionary (called 'the_di
    9·1 answer
  • 4. What aspect of the initial database planning process would the formula (0 + Pt × 3 + p)/5 be used in?
    5·1 answer
  • Explain how Deep Packet Inspection works (DPI). How is this technology beneficial to Perimeter Security? Lastly, describe a scen
    6·1 answer
  • The graph of which function has an axis of symmetry at x=-1/4​
    15·1 answer
  • Plz answer me will mark as brainliest picture included ​
    15·1 answer
  • How do you think computers have helped improve documentation, support and services within the healthcare industry
    13·1 answer
  • Write the correct statements for the above logic and syntax errors in program below.
    12·1 answer
  • Which type of boot authentciation is more secure?
    10·1 answer
  • What do macOS and Windows use to prevent us from accidentally deleting files?
    15·1 answer
  • How many levels of heading tags are allowed in html?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!