1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavel [41]
2 years ago
6

What does this say: √ans

Computers and Technology
2 answers:
MArishka [77]2 years ago
8 0
It says Vans the show brand I believe?
dangina [55]2 years ago
5 0

Answer: I do belive is says Vans

Explanation:

You might be interested in
Read the following scenario what type of business letter do you think is required in this situation?
grandymaker [24]

Answer:

Cover letter

Explanation:

The type of business letter Melissa and Melrose would need to write is a Cover letter.

The Cover Letter is usually not more than a page document which gives a kind of summary or hint about who individual is and the quality of the individual, while highlighting why an individual is the best fit for the role they are seeking for.

Most recruiters usually make use of the cover letter, as a first hurdle, to screen out applicants especially when applications are much.

Melissa and Melrose, in addition to the resume they would submit for the volunteering job, would need a cover letter.

8 0
3 years ago
Read 2 more answers
3.1.1 What type of goods are car radio and remote control.​
Nuetrik [128]

Answer:

Radio Controlled cars .

4 0
2 years ago
If you press the Tab key when you're in in the last cell of a table,
KengaRu [80]
The answer is B.

If you press the tab key when you're in the last cell of a table, you will add a new blank row
8 0
3 years ago
Read 2 more answers
What are network operating systems
Svetllana [295]
A network operating system is basically a computer operating system that is designed to support a workstation, and other machines that are connected in the Local Area Network. It allows access to a certain devices and machines like printer, file sharing, etc.

4 0
3 years ago
Public-key cryptography (a form of asymmetric cryptography) is an encryption method that's widely used because: 1) it is computa
rosijanka [135]

Answer:

C.

Explanation:

7 0
3 years ago
Other questions:
  • Rikki has had several problems at work recently. Her printer isn't printing correctly, copies from the copy machine come out wit
    8·2 answers
  • Which course must first-time drivers in Florida take to be eligible for their Learner License?
    11·1 answer
  • Many computer magazines and Web sites present comparisons of several DBMSs. Find one such DBMS comparison article and compare th
    10·1 answer
  • New Jersey and New York have the highest state taxes in the United States. They also have high ratios of people moving out compa
    13·1 answer
  • Using a cell phone while operating a motor vehicle is considered distraction because
    8·1 answer
  • Give the appropriate term for each of the following.1. An easy-to-remember address for calling a web page (like www.code.org). 2
    8·1 answer
  • What is the name of the most expensive car and how much is it and what are its features
    15·1 answer
  • PLEASE HELP FAST !!!!!!!!!!
    12·1 answer
  • Should the use of hacktivists by a country against enemy organizations be considered an act of war? Why or why not? How about th
    8·1 answer
  • Molly claims that she doesn’t have to proofread her code for typos because the interpreter will catch her mistakes for her. Is s
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!