1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Monica [59]
3 years ago
12

HELP ME!! it’s a cross word, but I don’t know the answers, 25 points

Computers and Technology
1 answer:
disa [49]3 years ago
5 0

Answer:

2. knowledge

8. bedroom

10. Part timer

12. Grant

14. Salary

1.  Stream

3. Vocational

4. Report Card

Explanation:

You might be interested in
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
Gnoma [55]
Forensics.

--------------------------------------
5 0
3 years ago
A(n) __________ is a set of technologies used for exchanging data between applications and for connecting processes with other s
Harrizon [31]

Answer:

The answer is "Option ".

Explanation:

The SOA stands for "Service-Oriented Architecture", which is primarily known as a service set and these services enable you to communicate with each other. In the communication, it may require simple data to transfer to two or more services, which can be organized by those operations, and other options were incorrect, that can be explained as follows:

  • In option a, It is a business software, which is used to organized data, that's why it is wrong.
  • Option b and Option d both are wrong because the mashup process is used only on web services, which is not a part of SOA , that's why it is wrong.
5 0
3 years ago
Read 2 more answers
What type of block start a sequence?
ss7ja [257]

Answer:

An algorithm?

8 0
3 years ago
Instructions written in code that a computer follows are called:
seraphim [82]

\bold{Answer:}

Instructions written in code that a computer follows are called software programs.

4 0
3 years ago
Which is a safe Internet behavior?
Westkost [7]
Don’t give out personal information
7 0
3 years ago
Other questions:
  • A(n) ____ is an attack that takes advantage of a system vulnerability.
    7·1 answer
  • Diagnosing is solving the problem, and trouble shooting is figuring out what the problem is.
    15·1 answer
  • You're an administrator for a large corporation and you are responsible for deploying computers often and quickly. What server d
    10·1 answer
  • What is the best information to include in the template name to differentiate it from other templates? Check all that apply.
    6·1 answer
  • What are the five types of alignment in Word?
    12·2 answers
  • 3. Write a program to find the area of a triangle using functions. a. Write a function getData() for user to input the length an
    10·1 answer
  • Use the table on the right to convert from binary to decimal.
    11·2 answers
  • Which technology will a business use to identify unauthorized access to intranet sites or files by its employees?
    13·1 answer
  • Explain how AI smartphone software in the rental car can be a threat to privacy.
    14·1 answer
  • What does Amara hope will<br> happen when Dad sits on the sofa?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!