1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skelet666 [1.2K]
4 years ago
10

What word can you spell with the letters e, e, a, m, g, t, and k?

Computers and Technology
1 answer:
SVETLANKA909090 [29]4 years ago
8 0
Eat,get and Meg
all the words I can think of
You might be interested in
10 points
Bingel [31]

Answer:

cool this is cool

Explanation:reEEEEEEE

6 0
3 years ago
What is character referencing and why is it used?
Arturiano [62]

Answer: Character reference is the tool usually followed in the business world.It is defined as the recommendation that is provided by organization employee that has a relation with the candidate(individual) outside of the work. This also known as the personal reference. The candidate can be friend family or any other known person whose reference is being given.

This is used in the business field for revealing about the personality and character of the candidate apart from the skills and working abilities. It also helps in the hiring of the candidate easily when the description is good in the character reference.

6 0
3 years ago
A(n) ________ CPU has two processing paths, allowing it to process more than one instruction at a time.
lions [1.4K]
C. Dual-core is the answer
3 0
4 years ago
Read 2 more answers
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
This is a python program.
denpristay [2]

Answer:

word = input("Type your name: ")

print(len(word))

Explanation:

The len function will count all the chars in the string.

7 0
4 years ago
Other questions:
  • Wharton professor Jerry Wind "believe[s] that digital networks are the key differentiator, [and] enable new forms of sharing, di
    9·1 answer
  • By apply styles, _____________ formats are being applied each time.
    6·1 answer
  • The operating system is not directly involved in one of these tasks.Immersive Reader
    12·1 answer
  • A cpu with an external clock speed of 2 ghz and a 64-bit data bus can (theoretically) transfer how much data per second?
    8·1 answer
  • The difference between the various networks is the ______ of the coverage.
    11·2 answers
  • Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than
    15·1 answer
  • Which option allows you to view slides on the full computer screen?
    11·1 answer
  • Given the availability of an ofstream object named output, write the other statements necessary to write the string "3.14159" in
    8·1 answer
  • Roadband is a network connection that
    15·1 answer
  • What is true regarding the cellular phone concept? a. a single radio broadcast tower system enables greater frequency reuse comp
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!