1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Misha Larkins [42]
4 years ago
6

What form of communication are they using​

Computers and Technology
1 answer:
Troyanec [42]4 years ago
7 0

Answer:

They are using a writing form of communication.

Explanation:

Letters can be used to communicate between two or more people.It is a very easy mean of communicating.

Hope this helps

You might be interested in
The _____ constraint assigns a value to an attribute when a new row is added to a table
bixtya [17]

The default constraint gives a value to an attribute when a new row is added to a table.

<h3>Is default a kind of constraint?</h3>

This is known to be a type of constraint that often apply a value to a column if an INSERT statement does not really give the value for the column.

Therefore, one can say that the default constraint gives a value to an attribute when a new row is added to a table.

Learn more about default constraint from

brainly.com/question/19130806

#SPJ12

5 0
2 years ago
How do you create code on scratch?
lina2011 [118]
On scratch they feature a drag and drop form of coding to visualize it. You can create an account and drag and drop puzzle ties in the order. The first tile you’ll want to drag into the area is the “start program” tile and then you’ll need to connect tiles from there.

Hope this helped!
3 0
3 years ago
Read 2 more answers
Which service uses a broadband connection?
Sidana [21]

Answer:

d

Explanation:

because all in one question form

5 0
3 years ago
Explain briefly the FIREWALLS
Vlada [557]

Answer:

Think of a firewall as your own personal security guard. The firewall will block unapproved websites from talking to your computer and will stop your computer from talking to unapproved/unnecessary websites. Hope this helps!

Explanation:

7 0
3 years ago
Edhesive coding practice 3.4​
allsm [11]

I'm sorry i have to go to sleep.. Can we continue tm?

In the morning

8 0
4 years ago
Read 2 more answers
Other questions:
  • Create a class called Name that will have three fields first name, middle initial, and last name as parameters. Add a constructo
    15·1 answer
  • Carly is part of a community of developers. In her free time, she works on code to improve this open-source operating system. Th
    11·1 answer
  • What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor?
    11·1 answer
  • Dusk is considered “a magic hour” by photographers and is the time when light is the least harsh. True or false.
    12·2 answers
  • Psychographics may also be called A. personality analytics. B. social group dynamics. C. lifestyle analysis. D. opinion insight.
    6·1 answer
  • Which testing is an example of non-functional testing? A. testing a module B. testing integration of three modules C. testing a
    13·1 answer
  • Define computer memory and write it's type ​
    6·1 answer
  • A developer calls you with a problem. He was trying to debug a new daemon and mistakenly placed it on the production machine ins
    6·1 answer
  • A blueprint or a "print" needs to
    9·1 answer
  • which one of the following portfolios cannot lie on the efficient frontier as described by markowitz? portfolioexpected returnst
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!