1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grandymaker [24]
4 years ago
12

2. Billys teacher asked him to type a report about asian food. Which paragraph format should he use?

Computers and Technology
2 answers:
marusya05 [52]4 years ago
8 0


Billy should right a short paragraph..


defon4 years ago
3 0

He should indent in the paragraphs and he should center the reference page.
You might be interested in
When workers demonstrate patience, are able to manage there emotions, and get along with other employees, which skills are being
LenKa [72]
The skill thar is being displayed I thing is being outgoing and loyal
6 0
3 years ago
Read 2 more answers
During the system investigation stage, __________ studies are done to determine if the hardware, software, and communications co
oksano4ka [1.4K]

Answer:

The correct answer is "Technical Feasibility".

Explanation:

System investigation is used to Review that whether the system is feasible or not for the proposal that they will design or creating.in the system investigation stage, we do the technical feasibility. The technical feasibility is used to check technical resources like hardware, software, etc in the organization.

The  Technical Feasibility in the System investigation  is used to solve the problem of business

6 0
4 years ago
Although the chi-square distribution is continuous, it is used to analyze discrete (counts) data
Roman55 [17]
This is true! The chi-square distribution is continuous and it is used to analyze discrete (counts) data.
4 0
4 years ago
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
Fill in the blank. THANK YOUU
Svetllana [295]

Answer:

She's procrastinating

Explanation:

3 0
3 years ago
Other questions:
  • Network id is 192.168.10.32/28. what would be the ip address, if you assign the last available ip address in the range
    14·2 answers
  • A​ client-server application that requires nothing more than a browser is called​ ________.
    8·2 answers
  • ¿Qué 3 objetos son productos tecnológicos?
    9·1 answer
  • Which setting on a profile makes a tab NOT accessible in the All App Launcher or visible in any app, but still allows a user to
    11·1 answer
  • What is not a basic function of a computer?
    10·2 answers
  • Adam has decided to add a table in a Word doc to organize the information better.
    10·1 answer
  • How many bits does it take to represent the values from 0 to 255?
    9·1 answer
  • How do you change your grade level
    10·1 answer
  • What is the purpose of each component ?
    6·1 answer
  • When conducting memory and recall tests, some people make an effort to normalize memories by not reporting extreme cases. this l
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!