1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zzz [600]
3 years ago
12

Please Help!! Digital Information Technology Class!!

Computers and Technology
2 answers:
Rama09 [41]3 years ago
6 0
It’s probably GUI??.
klemol [59]3 years ago
3 0

Answer:

It's peer-to-peer

Explanation:

You might be interested in
I love my baby boy and can someone help me with this
mamaluj [8]
Ice cream sandwich definitely
8 0
3 years ago
Why should we apply print preview before printing the document.​
Ghella [55]

to helps them to see how the final printed material will appear. 

7 0
2 years ago
Fill in the blank
melamori03 [73]

Explanation:

save as because if u want to save the bame of it press save as to save it as what u want

3 0
3 years ago
Read 2 more answers
Why do Linux administrators prefer to give sudo access to application teams instead of letting them su to root?
likoan [24]

Answer:

Explanation:

some distros like ubuntu do not even allow su to switch to root. furthermore the su to root is dangerous because the user becomes the all-powerful administrative account, so no warnings are issued if the application team user tries to do something system-breaking.

8 0
2 years ago
Document design techniques make your document easier for readers to skim. Therefore, these techniques give your writing "High Sk
USPshnik [31]

Document design techniques that make your document easier for readers to skim and therefore gives your writing "High Skim Value" is true. The answer is letter A. Documents that give you a high skim value are the headings and subheadings, white space and the toposgraphy.

3 0
3 years ago
Other questions:
  • List two ways that guest could be defined
    12·2 answers
  • In order to plan George’s birthday, his father gave him a list of people who attended his birthday for the last five years. What
    8·2 answers
  • What is the height of the tallest possible red-black tree containing 31 values?
    7·1 answer
  • ___________is a security strategy that applies multiple layers of defense because there is an assumption that any single protect
    12·1 answer
  • URLs are directions that browsers follow in order to find specific web page files. What is the first part of the URL that is the
    14·1 answer
  • Which of the following is not true about VOIP?
    9·1 answer
  • To extract detailed and comprehensive responses from your client, use the _____ questioning technique.
    5·2 answers
  • 6.16 LAB: Find largest number (EO) Write a method, findMax(), that repeatedly reads in integers until a negative integer is read
    9·1 answer
  • To use the replace feature we can simply just press Carl+h,Carl+c,Carl+r
    13·1 answer
  • Can someone give me an earsketch song of summer to turn in
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!