1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sophie [7]
2 years ago
15

While doing online research you enter this keyword search with a truncation character: man* Which of the following would not be

a possible response to your search?
Computers and Technology
1 answer:
Georgia [21]2 years ago
6 0
What are which of the following?? You didn't put the choices
You might be interested in
To insert a new slide in an existing presentation, what menu should you select?
Lelechka [254]
You would select add slide if you where using keynote! 
3 0
3 years ago
Read 2 more answers
What is the name of the virus that appears to be a legitimate program but when opened
vivado [14]

Answer: trojan horse virus

Explanation:A trojan horse is a non-replicating program that looks legitimate, but it is actually used to perform malicious and illicit activities when launched. Attackers use trojan horses to steal a user's

personal information like password information, or they may simply use it to destroy programs or data on the hard disk.

6 0
3 years ago
Which of the following tabs on the Ribbon contains the commands for adding tables, pictures and shapes into a publication? Quest
kipiarov [429]

Answer:

it is insert

Explanation:

4 0
2 years ago
To simplify the conceptual design, most higher-order relationships are decomposed into appropriate equivalent _____ relationship
LenaWriter [7]

Answer: binary

Explanation:

Conceptual design refers to the early phase of the design process, whereby the outlines of function are articulated. The conceptual design consist of the design of processes, interactions, and strategies. It is the first stage in the database design process.

The output of the conceptual design process describes the main data entities, and constraints of a particular problem domain. To simplify the conceptual design, most higher-order relationships are decomposed into appropriate equivalent binary relationships whenever possible.

5 0
2 years ago
Write a short-essay discussing your own stand on social media usage for students.​
hjlf

Answer:

More than half of the world’s population uses the internet. This is highlighted by social media users increasing by 21% since 2015, with 2.8 billion users reported globally in 2017.

Humans are social animals. We always like to remain in some group or another, and we prefer to follow what this group does. All of our traditions and cultures are the product of <em><u>this</u></em> group-oriented facet of human nature.Everyone is connected to one another in this vast network generated by the Internet.It illuminates the lives of thousands of people by spreading knowledge internationally, thereby making us global citizens. 

<h2><em><u>NOT</u></em><em><u> </u></em><em><u>COPIED</u></em><em><u> </u></em><em><u>ANSWER</u></em><em><u> </u></em></h2>
3 0
2 years ago
Other questions:
  • A ____________ variable is available throughout a program.
    7·1 answer
  • The score of a student in two subjects are inserted in the B2 and C2 cells and the passing score for each subject is 60. Which o
    13·1 answer
  • What important information is needed if you are installing an oem version of windows 7?
    6·1 answer
  • To say the internet has helped democratize knowledge means that
    11·1 answer
  • Discuss the different types of user-friendly interfaces and the types of users who typically use each.
    12·1 answer
  • In rolling a die four times, what is the odds that at least one 5 would appear?
    6·1 answer
  • Next, Leah wants to add a content slide that allows her to insert a table.
    8·2 answers
  • 7. A patent is an example of a rare and valuable resource. Indicate whether the statement is true or false and also justify it.
    14·1 answer
  • The term used to describe an OS designed mainly to share network resources.
    10·1 answer
  • you are setting up an active directory environment for a business that has three locations and 300 users. you want the users to
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!