1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adoni [48]
3 years ago
6

Select the correct answer from each drop-down menu.

Computers and Technology
1 answer:
Gelneren [198K]3 years ago
4 0

Answer:

Maybe computer engineering and marketing skills

You might be interested in
Which organization safeguards americans from health, safety, and security hazards and threats?
Mrrafil [7]

OSHA (Occupational Safety and Health Administration)

4 0
3 years ago
Read 2 more answers
A runtime error is usually the result of:
harina [27]
It is the Logical error/
so ur answer is logical error
8 0
3 years ago
A picture drawn in 3 d is called?​
Varvara68 [4.7K]

Answer:

autostereogram

Explanation:

that^

6 0
3 years ago
Read 2 more answers
What is a database query?
lana [24]
C.a form used to create a new tables for the database
8 0
3 years ago
Read 2 more answers
A store sells rope only in whole-foot increments. Given three lengths of rope, in feet, the following code segment is intended t
Lynna [10]

Answer:

The answer is "option B".

Explanation:

In the given code, four double variable "len1, len2, len3, and total" is declared, in which the first three variables accept some value, and in the total variable, we add those variable. In the next step, an integer variable minLength is defined, which converts the decimal value to an integer and adds the value that is "0.5". In this section, the code uses as an intended purpose but only if the total of 3 lengths is equivalent to or larger then 0.5, and wrong choices can be described as follows:

  • In option A, It accepts the negative value, that's why it is wrong.
  • Option C, Option D, and Option E all were wrong because the code segment is work as intended.
5 0
3 years ago
Other questions:
  • A(n) ________ address is a temporary ip address assigned from an available pool of ip addresses.
    12·1 answer
  • How are clustering and Network Load Balancing similar?
    13·1 answer
  • Some computer engineering students decided to revise the LC-3 for their senior project. In designing the LC-4, they decided to c
    13·1 answer
  • The part of the computer that contains the brain, or central processing unit, is also known as the
    15·1 answer
  • What are the advantages and disadvantages of the various collision resolution strategies for hashes?
    7·2 answers
  • Julie is purchasing new shoes on a website for her favorite store. Which of the following would indicate that a website is a sec
    6·1 answer
  • What are the different alignment options available in Microsoft​
    11·2 answers
  • Please help I need help with web technology I forgot to post the question in the last one. here it is tho.
    9·1 answer
  • Who is the monst important person and why
    11·1 answer
  • ________ is the general name for a security flaw in a program. Group of answer choices A security fault A virus Malware A vulner
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!