1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetlana [45]
3 years ago
9

What is the main reason to create flash cards?

Computers and Technology
2 answers:
Alex Ar [27]3 years ago
7 0

to show how contest relate to each other and to identify any questions on the way either one is okay. my personal suggestion is to pickhow concepts relate to each other

ryzh [129]3 years ago
5 0

the main reason it to create flash card is the first one

You might be interested in
REEEEEEE I STILL NEED MORE AESTHETIC USERNAMES TO GO OFF OF PWEASE HELP IMA HAVE A PANIC ATTACK!!!... next post ima do a vote :&
aev [14]

StrawberryTeaa (could be any fruit: blueberry, peach, etc)

potatoxchip

pastelsquid

SquishyPeach

GummiBear

ElegantFlaws (could add an e and remove the s: EleganteFlaw)

hunnie_b (or honee, honnie, hunni, etc)

agonyisheree

It's cool if you don't like these. I had trouble when I changed my user too. But you'll find your perfect username eventually. :)

7 0
3 years ago
The gap between those who have easy access to the internet and technology and those who do not is known as the
kirill [66]
Computer concepts... hope it helps
7 0
3 years ago
How can we use social networking site as an educational tool?​
crimeas [40]

Answer:

a

Explanation:

a

7 0
3 years ago
Why is it that people say they “slept like a baby” when babies wake up like every two hours?
yKpoI14uk [10]

Answer:

Because babys sleep comfortable idiot.

6 0
3 years ago
Injection attacks variants can occur whenever one program invokes the services of another program, service, or function and pass
velikii [3]

Answer:

True

Explanation:

In Computer science, It's true that injection attacks variants can occur whenever one program invokes the services of another program, service, or function and passes to it externally sourced, potentially untrusted information without sufficient inspection and validation of it.

5 0
3 years ago
Other questions:
  • What three characteristics of a function are described in an IPO chart? What is performed at each characteristic?
    12·1 answer
  • Each cout statement has a syntax error. Type the first cout statement, and press Run to observe the error message. Fix the error
    11·1 answer
  • Each webpage is assigned a(n) ______, an address that identifies the location of the page on the Internet.
    6·1 answer
  • Write the definition of a class clock. the class has no constructors and three instance variables. one is of type int called hou
    12·1 answer
  • What is the purpose of using a good e-mail technique?. Demonstrate your ability to write good e-mails b. Completely describe you
    8·1 answer
  • Which careers use web browsers
    8·1 answer
  • I need help please !!!!
    12·1 answer
  • Why is it important to think about the programming language to use?
    6·1 answer
  • Choose ALL guidelines listed below pertaining to fair use.
    12·2 answers
  • Which of the following is NOT a long-term storage device?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!