1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pachacha [2.7K]
4 years ago
8

What is the difference between an electronic notebook and electronic flash cards?

Computers and Technology
1 answer:
Ivenika [448]4 years ago
7 0

Answer:

A) Electronic notebooks store images, videos, notes, and voice recordings in one area, while electronic flash cards are study tools with information written on both sides.

Explanation:

Just took the test

Edge 2020

You might be interested in
You are applying for a secretary position. You have many skills but which of the following would not be one to include on the ap
zepelin [54]

A. How many marathons you have run, because it doesn't relate to the job you're applying for.

6 0
3 years ago
Read 2 more answers
Clicking on the cube that appears in the top right of the 3D view window will: (1 point)
german

Answer:

The correct option is;

Toggle between orthographic and perspective views

Explanation:

On a game design program such as Unity 3D, when the cube with colored pointers that can be located on the 3D view window is clicked, it will bring about a switch between the perspective or 90 degrees and orthogonal views which enables the display of the object in three dimension that appears more like real life figures.

5 0
3 years ago
A firewall can consist of all devices positioned on the network _____________.
ale4655 [162]

Answer:

The answer to this question is "perimeter".

Explanation:

In computer science, the firewall is used to provide a network security system that manages network traffic like incoming and outgoing signals. This traffics is based on predetermined security rules. The firewall typically installs a boundary between a trusted inner network and an untrusted outer network, such as the Internet. It is a software concept and Perimeter firewalls manage the flow of network traffic and host or organization's border the boundary that provides the first line of security against outer attacks and blocking access to inappropriate content from inside an organization.

6 0
4 years ago
9. Question
Gennadij [26K]
A server stopped provide service to 100 users
5 0
3 years ago
What is the maximum number of elements that will be visited by the binary search algorithm when searching a sorted 45-element ar
sergey [27]

The max nukber of elements visited will be 6.

6 0
2 years ago
Other questions:
  • In dt.py, you will implement a basic decision tree classifier for
    5·1 answer
  • List of programming languages and their typing
    5·2 answers
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    12·1 answer
  • What determines the keystroke to open a cmos editor? how can you find this information?
    15·1 answer
  • You will be given a string, containing both uppercase and lowercase alphabets(numbers are not allowed).
    14·1 answer
  • Student creates a Raptor program and uses the File Input and Output method to find the average of 5 test scores stored in a text
    5·1 answer
  • What is the default font style of “Title” box in MS PowerPoint 2013?
    8·1 answer
  • Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither.
    5·1 answer
  • You’ve found the file you’ll be working with. Next, you decide to move
    13·1 answer
  • Convert the following binary to decimal number . <br>a). 101101 ​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!