1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Schach [20]
3 years ago
12

If a document reaches you, and requires you to perform some action, you should do it immediately if ________. a. It is from your

mother or father b. It seems important but not urgent c. It will take less than two minutes to complete d. The language in the document is polite
Computers and Technology
1 answer:
tatyana61 [14]3 years ago
8 0
C is the answer to this
You might be interested in
Critical thinking questions
Scrat [10]

Answer:

1: A loop will continue running until the defined condition returns false . ... You can type js for , js while or js do while to get more info on any of these. ... initialization - Run before the first execution on the loop. ... But it can be used to decrement a counter too.

2: The loop increments the value of new while the loop condition is true. The end value of new is 3.

3: We could use some sort of finger recognition or face so they don’t have to type in their password.

4: give them a second chance for their date of birth.

5: sum = 0 must be before for loop. If inside for loop, it will keep resetting sum to 0 each iteration.

Explanation:

8 0
2 years ago
Adding videos to your website can be tricky because there may be problems making sure they will play in all
Volgvan
The sentence ends with the word 'devices'
4 0
3 years ago
The Wired Equivalent Privacy standard had what significant disadvantage?
Ivanshal [37]

Answer:

Wired equivalent privacy standard has the significant disadvantages as, it is uses the static encryption keys. Wired equivalent privacy are the security and the privacy protocol which are used for designing the wireless local area network. And the static encryption key are used to set up the router for encrypting the packet in the device. The main disadvantage is that it enables the MAC address and it is easily detectable by the hackers.  

 

6 0
3 years ago
Read 2 more answers
Which command should you use to display both listening and non-listening sockets on your linux system? (tip: enter the command a
trasher [3.6K]

Answer: netstat -a

Explanation: The netstat -a command displays both listening and non-listening sockets.

3 0
2 years ago
Jude is a part of a publishing house. He does editing work for them and often comes across articles that have materials copied f
Butoxors [25]

Answer: The guy in the story did copyright

Explanation:

I am not to sure about this but this is my best guess hope it helps!!

5 0
3 years ago
Other questions:
  • _____ is the widely used transport layer protocol that most Internet applications use with Internet Protocol (IP).
    9·1 answer
  • Every page on a website must be updated recently to consider the website updated/maintained
    13·2 answers
  • Which of the following are not deducted on a typical pay stub
    12·1 answer
  • The _________ in Java is passed by value but ______ is passedby reference.
    5·1 answer
  • What is a quasi vpn?
    14·1 answer
  • Credible sites contain __________ information,
    7·2 answers
  • What is the output?
    5·1 answer
  • What are some best practices for file management
    8·1 answer
  • How do mutations affect natural selection? brain pop
    11·1 answer
  • How to transfer polygon from eth to polygon in ledger live
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!