1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KATRIN_1 [288]
3 years ago
5

Document _____ are the details about a file.

Computers and Technology
1 answer:
True [87]3 years ago
8 0
Document Properties as i think
You might be interested in
When summarizing graphs of categorical​ data, report the​ _______ and describe the​ _______?
Alex_Xolod [135]
Hello <span>Rouahidy7821 
</span><span>

Answer: When summarizing graphs of categorical​ data, report the​ models and describe the​ </span><span>variability. 
</span>
Hope this helps
-Chris
7 0
3 years ago
What does the acronym OSHA stand for? A. Occupational Safety and Health Administration B. Occupational Safety and Human Activiti
poizon [28]
The answer is A. Occupational Safety and health Administration.
4 0
2 years ago
Read 2 more answers
Which behaviors demonstrate good netiquette? Check all that apply.
Andru [333]

Answer:

identifying yourself in a post or e-mail

writing short

respecting others privacy

Explanation:

3 0
3 years ago
Write a partial class that shows a class constant and an instance method. Write an instance method that converts feet to inches
MA_775_DIABLO [31]

Answer:

Please the code snippet below, the code was writen in Kotlin Language

Explanation:

const val inches:Int= 12 .   //This is the const value

fun main(args: Array<String>) {

 //this will ask the user for input

   print("Enter a number")            

  //this will do the conversion

var valueInFeet= Integer.valueOf(readLine())*inches

   print("The value in feet is $valueInFeet feet(s)")  

   }

4 0
2 years ago
Which of the following are breach prevention best practices?Access only the minimum amount of PHI/personally identifiable inform
Rudiy27

Answer:

All of this above.

Explanation:

All the mentioned practices can be use to prevent breaches.

6 0
3 years ago
Other questions:
  • A ____ is a program that is installed without the permission or knowledge of the computer user, that is designed to alter the wa
    11·1 answer
  • What is process equipment?
    12·1 answer
  • Expressing your needs to others is aggressive behavior.<br> True or False?
    5·2 answers
  • What conclusion did Freud reach when attempting to understand the connection between psychological and physical problems?
    12·1 answer
  • Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera
    12·1 answer
  • Paul has been working long hours. He is tired and distracted by family issues,
    10·1 answer
  • Ok so I usually don’t do this but I just need an answer , on Instagram a notification popped up while I was watching someone’s s
    9·2 answers
  • Eun-Joo is working on a circuit board. There is no electrical current flowing through a certain switch on the circuit board.
    9·2 answers
  • What are the basic data types supported in C programing language?
    10·1 answer
  • Which two extensions in scratch are correctly matched to their accessibility goals
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!