1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jet001 [13]
3 years ago
13

I need help!!!!

Computers and Technology
2 answers:
DerKrebs [107]3 years ago
4 0

I'd go with C personally.

GarryVolchara [31]3 years ago
3 0
I would probably go with option B.
You might be interested in
Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other
quester [9]

Answer:

Option B is correct.

Explanation:

As such an application programmer, Shania recently began a new work. The first assignment was to create an earlier software available on certain devices, developed for Android.  

So, she using cross-platform software to compose application code that might convert the current android application code across various native versions to makes it much simpler and quicker for her job.

Other options are incorrect because they are not related to the following scenario.

4 0
3 years ago
Mario was surprised that the box that was supposed to tell him how many words he used in his document did not appear after the s
Nookie1986 [14]

Answer:

Click the Display tab

Explanation:

Choose the Word count option to make it visible, within the Display tab dropdown

7 0
3 years ago
Read 2 more answers
which application software allows you to compose written ideas on a computer? database, spreadsheet, word processor or graphics
Kazeer [188]
Word processor because it's more for writing
8 0
3 years ago
How can security professionals use software to recover stolen laptops ?
inna [77]

<u>Answer is:</u>

E). They monitor email traffic.

<u>Explanation:</u>


Track Your Device's IP Address with mail. If your laptop or smartphone was stolen, you can use a service like mail to find the IP address of your thief. When you log into those services from any computer, it logs the IP address used, and displays your last used IP in your account. So, these are source for finding the stolen laptop and smartphones.

I hope you got the idea. Thanks

3 0
3 years ago
1) Draw an activity diagram according to the below flow of event:
stiv31 [10]

Answer:

Yyyyttttrrttyuynynnyj6jj

6 0
3 years ago
Other questions:
  • What is authentication?
    8·1 answer
  • What is the function of the modem?
    12·2 answers
  • A jackhammer uses pressurized gas to transmit force to the hammer bit. What type of mechanical system is it?
    13·1 answer
  • The Open Systems Interconnection (OSI) is a conceptual model whose purpose is to make networks more manageable. Its objectives i
    15·1 answer
  • Which of these options highlights the need for learning algorithms
    9·2 answers
  • When attaching a file or files in outlook 365 you select the attach command and then select the files location
    5·1 answer
  • PLS HELP WITH MY PYTHON HW ILL GIVE YOU BRAINLIEST
    12·1 answer
  • A write the result P*=++j where j is 24
    5·1 answer
  • What is Utility Software ? Name any two utility programs. <br>​
    15·2 answers
  • how could environmental and energy problem Kenya faces as far computer installations are concerned be avoided​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!