1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nezavi [6.7K]
3 years ago
15

Rewriting notes into complete sentences is unnecessary if you want to include the notes in your study guide. Truth or false?

Computers and Technology
2 answers:
faust18 [17]3 years ago
6 0

its false i just took the test

goldfiish [28.3K]3 years ago
4 0

The answer would be true. They're notes, so you don't need it to be written perfectly.

Edit: How would this be incorrect? A study guide is a personal thing, and so are notes. So long as you understand the notes, they don't need to be written as perfectly as an essay would.

You might be interested in
What is this I’m so lost
Inga [223]
It is C or multi view since it is looking at the object from multiple sides as perspective

It is not assembly (A) since it is not showing how to put it together, it is not section(C) because it isn’t a chopped up piece of it and it is not exploded (D) because exploded is kinda like assembly where all components are separated and this picture isn’t so. It is C since it is simply showing the view from the top, side, and back
8 0
3 years ago
The email application used by Jim’s office is sending emails with viruses attached to them to user’s computers. What step should
Finger [1]
Delete the program and install a new software.
5 0
3 years ago
Read 2 more answers
A(n) __________attack is designed to render the target unreachable by legitimate users, not to provide the attacker access to th
Nimfa-mama [501]
Denial of Service or Distributed Denial of Service.
3 0
3 years ago
What are the three fundamental elements of an effective security program for information systems?
marishachu [46]
<span>the three fundamental elements of an effective security program for information systems are Identification, Authentication and Authorization.The access control creates the user and assigns the rights to resources and authorization is giving permissions to the users to access the resources.The user who wants to enter the system should have a valid data t enter the system like password, fingerprint or any other type of recognition.</span>
4 0
3 years ago
Read 2 more answers
Just answer in five-line. Question:
Eddi Din [679]

Answer:

It is a half-duplex serial transmission mode, and this can be provided through the RS-485 two wired electrical interface. And this can be connected to the ethernet if required, connect to the LAN, and finally transmitting the video footage to all the screens. And the two reasons are:

1. Noiseless

2. Allows around 32 receivers.

Explanation:

Please check the answer.

3 0
3 years ago
Other questions:
  • Which statement describes the word "iterative"?
    7·2 answers
  • How will a packet tracer environment be affected if a heater is added to a container named branch office and turned on?
    5·1 answer
  • What does bam file stand for computer terms?
    9·1 answer
  • Which of the following statements is false? a. Each object of a class shares one copy of the class's instance variables. b. A cl
    11·1 answer
  • Write a function safeOpen() that takes one parameter, filename — a string giving the pathname of the file to be opened for readi
    15·1 answer
  • You are a developer for a company that is planning on using the AWS RDS service. Your Database administrator spins up a new MySQ
    7·1 answer
  • Which of the following is not considered format?
    8·2 answers
  • Find the Nearest Repeated Entries in an Array People do not like reading text in which a word is used multiple times in a short
    15·1 answer
  • Creating Classes
    10·1 answer
  • Many web pages use a <br> structure to define an area of focus
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!