1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lisa [10]
3 years ago
11

Please help me with this question. I don’t get it

Computers and Technology
2 answers:
tresset_1 [31]3 years ago
5 0

Answer:

A

Explanation:

Lelechka [254]3 years ago
3 0
A - they all use microprocessors to compute and store data.
You might be interested in
in an advertisement is made of a wireless keyboard and a mouse.Name two commonly used methods of connecting devices wirelessly​
DENIUS [597]

Answer:

Wireless LAN

Wireless MAN

Explanation:

I use these methods to connect my wireless devices all of the time and most of my friends do it as well so I am pretty sure it is a commonly used method.

3 0
3 years ago
i emailed someone and im sure that they emailed back however it says nothing has arrived in my inbox what do I do
Lynna [10]

Answer:

report it or check ur spam mail or refresh the page

Explanation:

good luck figuring it out :)

8 0
3 years ago
Traffic shaping reduces traffic by ________. preventing certain undesirable traffic from entering the network limiting the amoun
Lera25 [3.4K]

Answer:

Explanation:

Traffic Shaping is a technique for managing congestion on a network by delaying the flow of less important/desired packets on the network so more valuable/desirables ones are able to pass. Traffic shaping reduces traffic by preventing certain undesirable traffic from entering the network as well as limiting the amount of certain undesirable traffic entering the network.

5 0
3 years ago
Why has the Personal Software Process not been widely adopted by software industry?
professor190 [17]

Answer:

Personal software process is basically refers to the intellectually tough and demanding for a degree of commitment (for example: Prolonged and high priced training needed ) which are not usually feasible to attain.

In additional to the requiring stage of various dimension is culturally tough for various software program practitioners. As, it is not much feasible approach so the personal software processing is not much widely adopted by the various software industries.

5 0
3 years ago
Ok so this isn’t really a question that is for school but...
Nastasia [14]

Answer:

u shoud just keep it ;-;

Explanation:

5 0
3 years ago
Other questions:
  • Which of the following is a Web browser? Exit Test A Windows B Comcast High-Speed C Microsoft Internet Explorer D Modem
    7·1 answer
  • Write a main function to do the following: A. Declare an array of 20 strings. B. Create an input file for the file "poem.dat". C
    12·1 answer
  • The different types of DDR modules are easily identifiable because of what factor?
    8·2 answers
  • Why did the Wright brothers construct their own wind tunnel?
    11·1 answer
  • How do Europe and North America address the challenges of jurisdiction when a computer crime involves both continents?
    10·1 answer
  • Who are the best candidates for members of SkillsUSA? Check all that apply. Adolph wants to be an Elementary School Teacher. Rub
    5·2 answers
  • Jenny's needs to buy a computer to create word documents, make presentations, listen to music, and watch movies and videos. Whic
    13·1 answer
  • Please help me. i will mark you brailiest
    6·1 answer
  • How do I get the bot token for discord? (scripting etc)
    5·1 answer
  • what is required to successfully establish a connection between two routers using chap authentication?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!