1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kkurt [141]
3 years ago
11

What's the screen that displays results from typing text, performing calculations, or running programs?

Computers and Technology
1 answer:
Serggg [28]3 years ago
8 0
MONITOR is the screen that displays results from typing text, performing calculations, or running programs.


You might be interested in
What is predictive dialing?
Hunter-Best [27]
Answer: A

















Explanation:
3 0
4 years ago
While shopping online, Tucker visits a website that looks outdated and has limited reviews. Which of the following strategies sh
Otrada [13]

Answer:

Evaluate source credibility

Explanation:

cuz it is

4 0
3 years ago
____ refers to the order in which values are used with operators.
mylen [45]

Answer:

b. Associativity

Explanation:

Associativity specifies the order in which operators are processed vis a vis operands/values in an expression. For example: Consider the expression: a + b + c. Here a + b is evaluated first before adding the result with c as the '+' operator is left associative. The default associativity can also be overridden by the use of parentheses. For example a + (b + c) . In this case b+c will be evaluated first.

5 0
3 years ago
You use buttons and commands on the ribbon to tell word what you want to do. true or false
GarryVolchara [31]
Yes, that is true. The buttons and commands are used for their specific actions on the computer.
7 0
4 years ago
What are the five steps of ethical hacking?
Paraphin [41]

Answer

Explanation:

Hacking is simply gaining access into a computer through weaknesses that were found in the network system.

We have mainly 5 stages In ethical hacking which although must not be followed sequentially but could produce greater results if it was followed.

These stages includes

1. Reconnaissance

2. Scanning

3. Gaining access

4. Maintaining access

5. Covering tracks.

8 0
4 years ago
Other questions:
  • it is important to include the __ attribute of the tag because some people use text-only web browsers
    5·2 answers
  • Which is the responsibility of a software architect?
    11·1 answer
  • A(n) ______ chart is drawn on the same worksheet as the data.
    10·1 answer
  • When did project management first emerge as a profession
    6·1 answer
  • Machinery with rotating or reciprocating parts that are within seven feet of the floor or working platform requires what additio
    7·1 answer
  • Releasing refrigerator R -12 into the atmosphere is a criminal offense. A)true B) false
    5·2 answers
  • . A program will ""fall through"" a case section if it is missing the __________ statement.
    15·1 answer
  • to minimize wrist injury switch frequently among touch gestures the keyboard and the mouse true or false
    15·1 answer
  • CLS
    12·1 answer
  • a good way to repeatedly perform an operation is to write the statements for the task once and then place the statements in a lo
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!