1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mario62 [17]
3 years ago
9

Which pronoun correctly completes this conversation ? _____ tambien vreo que es simpatica

Computers and Technology
1 answer:
Semmy [17]3 years ago
4 0
Yo tambien vreo que es simpatica
You might be interested in
Advantages of heading attributes
avanturin [10]

Answer:

Benefits of Headings

Making texts larger helps guide the eye around the page. Using headings and making them visually apparent is especially helpful for users with cognitive disabilities. If the underlying code for a pages headings is correct, screen reader users can also benefit from headings.

Explanation:

6 0
3 years ago
Which of the following terms refers to the cells that contain values and labels to be graphed in the chart?.
quester [9]

There are cells in some charts. The terms that refers to the cells that contain values and labels to be graphed in the chart is source data.

<h3>What is the meaning of source data?</h3>

Source data is known to be a kind of raw data that is often known as an atomic data. They are data that has not been processed for any vital use to become Information.

In computer programming tech., source data or data source is known to be a kind of primary point or location from where data originates from. The data source is known as a database, a dataset, etc.

Learn more about source data from

brainly.com/question/10838478?source=archive

7 0
2 years ago
Cassie is worried about credential management on a network where users often have over six passwords to remember. She’s curren
nadya68 [22]

Answer:

Use a password manager

Explanation:

It is a disadvantage to use usernames and passwords for account authentication is a fundamentally defective security mechanism.

Your pet's name and other nomenclatures are very easy for hackers.

Advantages of a password manager:

  • Most password managers use multifactor authentication.
  • The information is stored, in encrypted form, on the servers operated by the providers; This is a strong enough security.
  • Examples of password managers LastPass, 1Password, Bitwarden, RoboForm, Intuitive Password, Dashlane, RoboForm etc.
5 0
4 years ago
¿Que es la energía? (una sola respuesta es la correcta)
kozerog [31]

Answer:

es la a ya que la luz actua en un cuerpo

8 0
3 years ago
1.) what is the minimum number of bits required to represent -3,997 using 2's complement form?
lisabon 2012 [21]

The binary representation of +3997 is 1111 1001 1101.

In one's complement this is simply adding a sign bit and inverting all the bits:

1 0000 0110 0010

The two's complement is the one's complement plus 1:

1 0000 0110 0011

That's 13 bits. Normally the sign bit would be at an 8, 16 or 32,... bit boundary.

For -436 it's 10 0100 1100 and 10 bits


8 0
4 years ago
Other questions:
  • Complete the recursive function raisetopower(). ex: if userbase is 2 and userexponent is 4, then raisedvalue is assigned with 16
    5·1 answer
  • When configuring a vpn server to automatically assign ​ip addresses to remote clients, how many ip addresses are in a single poo
    10·1 answer
  • Taking away iPad privileges when a student hits another child would be considered a(an) ________ principle for decreasing or ext
    10·1 answer
  • Which one of the following will not be considered as a microcomputer?
    12·2 answers
  • In which job role would a course in 3D modeling help with professional career prospects?
    9·2 answers
  • Which two fields in an Ethernet frame help synchronize device communica- tions but are not counted toward the frame’s size?
    11·1 answer
  • What is SoC? how is it different from CPU?
    14·1 answer
  • Can i have help for a ggogle class room
    14·1 answer
  • When a derived class method has the same name as a base class method, it is often said that the derived class method ________ th
    13·1 answer
  • The following is a function:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!