1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liubo4ka [24]
3 years ago
7

A benefit of flashcards is that they are

Computers and Technology
2 answers:
romanna [79]3 years ago
8 0
<span>a. Portable
The user can use flashcards and carry it around without having to carry a thick textbook or a computer for an online quiz or review game.

Hope this helps :)</span>
satela [25.4K]3 years ago
6 0

The answer is A: Portable

Flash cards are portable learning tools that give students the upper hand and can be carried anywhere with sheer ease and comfort. Rather than carrying bulky books around, flash cards allow students to carry as many cards as they want. You would not feel the weight even if you decided to bring flash cards in bulk.

You might be interested in
What are two reasons a network administrator would use cdp.
Ulleksa [173]

Answer:

To obtain VLAN information from directly connected switches. To determine the status of network services on a remote device. To determine the status of the routing protocols between directly connected routers .

Explanation:

6 0
2 years ago
You type a complex formula in cell A20. You would like to make the same calculation in cells B20 through H20. To be efficient, y
fomenos

Answer:

Use autofill

Explanation:

In excel "autofill" is used to fill data in cells, which follows the pattern or logic applied in other cells. To apply same calculation of A20 in B20 to H20, we use autofill technique. Instead of copy pasting, or manually entering the complex formula this method is more suitable.  

4 0
3 years ago
When Clara accesses the programs and documents on her computer by way of icons, she is said to be employing
julsineya [31]
Your answer would be D, graphical user interface. Hope this helps!
5 0
3 years ago
Read 2 more answers
PLZ HELP HELP HELP ME I NEED ANSWER MATH​
irina [24]

The first one is 0 (0/3=0)

The second one is 3 (3/3=1)

The third one is 2 (6/3=2)

The fourth one is 9 (9/3=3)

Hope this helps you :)

4 0
3 years ago
Read 2 more answers
Investigators are combing the site of an explosion with mesh screens to collect evidence. The explosion was very large, leaving
rewona [7]

Answer: SCANNING ELECTRON MICROSCOPY,

Explanation:Many methods are available for use in an explosion site to determine or confirm the explosive materials or bomb fragment seen or obtained from the site they include the following; SCANNING ELECTRON MICROSCOPY,

CHROMATOGRAPHY-MASS SPECTROMETRY, STEREO MICROSCOPY, CAPILLARY ELECTROPHORESIS.

SCANNING ELECTRON MICROSCOPY, is a technique used to identify or confirm a material by scanning the surface of the material using FOCUSED BEAM OF ELECTRONS IN AN ELECTRON MICROSCOPE.

6 0
3 years ago
Read 2 more answers
Other questions:
  • •What are some conflicts between humans and machines that have arisen in the past?
    14·1 answer
  • Jesse is trying to find a computer file. he types the name of the file into the computer search bar. the computer is most likely
    5·2 answers
  • Free 100 point to first to answer
    5·2 answers
  • (Best Buy Part A) At a Best Buy store, the forecast for the annual demand of a Motorola cell phone is 15600. Demand forecasts ar
    12·1 answer
  • Explain each of the three important concepts behind the Federal Networking Council's definition of the term Internet. Explain ho
    8·1 answer
  • How can forms help us reduce data-entry errors?
    12·1 answer
  • A ___________ variable is used to add up a set of values. fill in the blank
    8·1 answer
  • How was data put into the Tabulating Machine?
    7·1 answer
  • When software is purchased, a _____ is being bought that gives the purchaser the right to use the software under certain terms a
    9·1 answer
  • charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes a
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!