1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frosja888 [35]
4 years ago
5

What are the two houses in Congress?

Computers and Technology
1 answer:
Andreyy894 years ago
5 0
The House of Representatives and the Senate
You might be interested in
What are three ways to protect yourself from identity theft when using your smartphone or computer?.
raketka [301]

Answer:

1. Always download the latest updates .

2. Don’t click on rogue links .

3.Secure your devices (long, complex password on your computer and phone, using Anti-virus/Anti-Malware program) .

5 0
3 years ago
In 2 or 3 sentences, describe one advanced stradegy and how its useful
Tanzania [10]

Answer:

A search strategy is useful because it helps you learn about things that are not available to you in person. One advanced search strategy is to form words carefully. I could copy 'describe one advance search strategy and how it is useful' and put it into a search engine and get many different results that aren't helpful. But if I shorten it to 'advance search strategies' I get helpful information.

Explanation:

5 0
3 years ago
Amber wants to give her audience copies of her presentation so they can follow along and take notes. What option should Amber ch
blagie [28]

Answer:

Print handouts

Explanation:

I had this question and even if you didn't put the answer options i knew what it was I hope this helped you out (:

6 0
3 years ago
Read 2 more answers
Our Client, a renowned trading company, suffered a sudden, devastating power outage that caused their server to cease functionin
Norma-Jean [14]

Answer:

Explanation:

I will consult the following strategies:

Step 1: Being a discerning consultant I should be knowing what exactly has caused the drive to get corrupted.

Step 2: After examining the current state of the hard drive I will explain the actual problem to the client in a very lucid and eloquent manner whether it is feasible to retrieve the lost data or it is beyond repair.

Step 3: Identify a solution to the problem with things at my disposal(finding a right tool).

Step 4: apply the solution found to retrieve the data from the hard drive.

Step 5: submitting the retrieved data from the corrupt drive to the customer and advocating them the preventive measures for future reference.

The above five steps will work perfectly to resolve the issue faced if followed with great care and being heedful of the situation at hand.

6 0
3 years ago
Which of the following is NOT a type of cable used in wired networks?a) Unshielded coaxialb) Coaxialc) Unshielded twisted-paird)
zysi [14]

Answer:

I think it is unshielded coaxial. Not 100% sure.

Explanation:

5 0
4 years ago
Other questions:
  • In an ipv4 address, what are the maximum number of bits that can be used to identify the network address
    14·1 answer
  • You use this method to determine the number of items stored in an arraylist object.
    12·1 answer
  • Can a msi b450 tomahawk motherboard fit into a darkflash dlm21 mesh micro atx tower
    13·1 answer
  • What are the 6 external parts of a computer system
    5·1 answer
  • Why is ssh preferred over telnet for remote connections?
    10·1 answer
  • Here's another question!<br><br> What is some iterative programming structure uses?
    13·1 answer
  • Technician A says that a lead acid battery uses straight Hydrochloric acid for electrolyte. Technician B says that a lead acid b
    10·2 answers
  • Why is information broken down into packets
    15·1 answer
  • What do u mean by software​
    7·1 answer
  • PLEASE HELP ILL GIVE BRAINIEST
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!