1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ozzi
3 years ago
11

QUESTIONS

Computers and Technology
1 answer:
Agata [3.3K]3 years ago
3 0
C. Only when you sleep

Hope I helped ( :
Please Thank Me
You might be interested in
Which of the following is NOT true about a savings account
Andrew [12]

Answer: Withdraws

Explanation:

You can withdraw how ever many times you want from a savings account

4 0
3 years ago
Why is it not advisable to mark tlc plates with a pen to indicate?
nikitadnepr [17]
The plate can change the function that is in it. If you were to name it wrong, you would have to debug the code and possibly rewrite it.
3 0
3 years ago
........... Is ready made button for defining hyperlink on a slide​
Gwar [14]
Action Buttons An action button is a ready-made button that you can insert into your presentation and define hyperlinks. Use action buttons when you want to include buttons with commonly understood symbols for going to the next, previous, first, and last slides.
4 0
3 years ago
Do you need special software to create a web page?
Serjik [45]

Answer:

Many websites these days have done it for you, (Wix, Squarespace ect.)

If you want to start from scratch however, then I believe you do, I have only researched these websites which do it for you.

Hope this helped :)

5 0
4 years ago
Read 2 more answers
What are two key elements of describing the environment?​ a. ​ Communication protocols and security methods b. ​ External system
pashok25 [27]

Answer:

B. External systems and technology architecture.

Explanation:

In such environment, you have to know what external systems are in place so have proper communication with External Systems whether be in message format or web/networks, Communication protocols, Security methods, Error detection and recovery,

Additionally, it consits of technology architecture so conforming to an existing technology architecture helps us discover and describe existing architecture

3 0
3 years ago
Other questions:
  • Which major and minor keys have no sharps or flats apex?
    5·2 answers
  • Which of the following rules should be used to keep the appropriate distance between your vehicle and the vehicle in front of yo
    10·2 answers
  • How do you access the dark web? What are the negatives of doing this?
    14·1 answer
  • What type of link is used to call this file shown below?
    5·1 answer
  • An actual printout of computer data always satisfies the best evidence rule?
    12·1 answer
  • "Why learning how to type is so important.
    7·1 answer
  • Jess computer has system software including an operating system and utility software jess runs the defragmentation program on he
    5·1 answer
  • Mô tả những lợi ích của việc sử dụng đa xử lý không đồng nhất trong một hệ thống di động
    8·1 answer
  • Which answer below is NOT a function of a Data Scientist? O Data Exploitation O Data Strategies O Data Modeling O Data Preperati
    5·1 answer
  • The Cisco ____ model does not describe how communications take place. Rather, it focuses on how best to design a network, especi
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!