1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cupoosta [38]
3 years ago
8

_____ are types of changes that occur when text has been omitted from a document and must be inserted later.

Computers and Technology
2 answers:
Andrej [43]3 years ago
7 0
Additions are types of changes that occur when text has been omitted from a document and must be inserted later.
Kisachek [45]3 years ago
6 0
I believe they are called revisions
You might be interested in
What is the ascii code for the letter D
PilotLPTM [1.2K]

Answer:

068

Explanation:

Or if you want binary it's 01000100

4 0
2 years ago
What is the best application to create a slide show presentation?
Lynna [10]

Answer:

Microsoft Windows File Manager

5 0
3 years ago
Read 2 more answers
How do you think we could print a sentence that uses a variable along with other text (ie: “My name is Joe” where ‘Joe’ is a var
Sphinxa [80]

This is for Python

name = 'Joe'

print(f'My name is {name}')

This is called string formatting. Using f before the text. This is another way

name = 'Joe'

print('My name is', Joe)

But I found that string formatting is cleaner and much more useful

4 0
3 years ago
(True/False). In an "ID" column with the data type INTEGER PRIMARY KEY, each value entered for the ID must be unique.
musickatia [10]

Answer:

The answer is "True".

Explanation:

  • The key to a relational database that is unique for each data record is a primary key, also called a primary keyword.
  • This unique identifier, including a driver's license name, telephone number, or vehicle identification number. This is an identifier (VIN).
  • There must always be the only primary key in such a relational database.
  • This is a specific relational database field (or column combination) that identifies each table entry in a unique way.
  • It utilized it to swiftly analyze the data within the table as a unique identifier.
5 0
2 years ago
How can chess computers be programmed so that it can be so accurately adjusted to a skill level ranging from a beginner to a gra
Elis [28]
They are artificially intelligent. They watch thousands of hours of videos of the game they are going to play. After they learn, they challenge themselves against themselves and save all the moves it used that time, they play another game against the saved game and if they best it then they save the new and repeat. I am not sure about this because I am just a 15 yr old but the early ones brute forced the game and one. Brute Forcing is a way to try out every possible move and pick the most like to succeed or the most efficient one, brute force is also used in hacking or cracking passwords that have something in common. Like let's say ur password is Jakeis35. I would make a list that would be:
Jake
jake
Is
is
35
34

and with a software it will put together every possible pair and will stop when it matches the password on the server or if the password let it login.
5 0
3 years ago
Other questions:
  • All of the following are ways to improve the mobile experience for a website visitor EXCEPT:
    8·1 answer
  • A ____ by a design professional is used to determine the best system to provide the appropriate level and type of protection.
    6·1 answer
  • Mobile apps known as news _________ collect articles from a variety of sources and present them to you in a magazine-style forma
    7·2 answers
  • Without protocols the information sent and received through the Internet would never reach its intended target and even if it di
    6·1 answer
  • What the repeal of online privacy protections means for you?
    8·1 answer
  • The use of electronic media, information, and communication technologies to deliver instruction where students are not required
    8·1 answer
  • (Help please I don't know what to choose because it's both text and email but I can only pick one. HELP!!!!!!!!!!)
    6·2 answers
  • Your organization uses a type of cryptography that provides good security but uses smaller key sizes and utilizes logarithms tha
    9·1 answer
  • Which one of the statements best characterizes the current state of e-commerce?
    15·1 answer
  • Can someone help me so I don’t fail this class:(
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!