1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ololo11 [35]
4 years ago
8

Which is the following not true about peer to peersoftware?

Computers and Technology
1 answer:
natita [175]4 years ago
4 0
Peersoftware is the better one and you should use that if you can get it 

You might be interested in
Differentiate between inherited trait and acquired trait​
miskamm [114]

Answer: Inherited trait is something you already have and acquired is something that you learn or achieve.

Explanation:

8 0
4 years ago
The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IE
marta [7]

i believe the answer is b.

8 0
4 years ago
What is a geam in the ggplot2 system?
riadik2000 [5.3K]

Answer:

a) a plotting object like point, line, or other shape

Explanation:

A geom in the ggplot2 system is "a plotting object like point, line, or other shape."

A Geom is used in formulating different layouts, shapes, or forms of a ggplot2 such as bar charts, scatterplots, and line diagrams.

For example some different types of Geom can be represented as geom_bar(), geom_point(), geom_line() etc.

3 0
3 years ago
How can you refer to additional information while giving a presentation?
dimulka [17.4K]
The most common way I've seen is to have a slide where you have the additional information. It can be phone numbers, email address, websites, books, anything you want to refer to.
People tend to photograph these slides so make sure the information is error free and that you add you own marketing info to the slide as well.

5 0
3 years ago
Is there SUM in Small basic? ​
babunello [35]

Answer:

no

Explanation:

3 0
3 years ago
Other questions:
  • Most OEMs recommend that the engine oil be replaced and a new filter installed at which of the following mileage intervals ?
    7·1 answer
  • Which of the following is a Federal law that provides a definition of the term cyberterrorism and under which young people prima
    7·1 answer
  • A Security Policy is: a. How we implement security b. Corporate direction on behavior c. A statement of consequence for failure
    5·1 answer
  • We can include following item(s) during configuration itemidentification:
    10·1 answer
  • What made it possible to develop personal computers?
    10·2 answers
  • Identify the problems that computer program bugs can cause. Check all that apply.
    9·2 answers
  • Any task done by software can also be done using computer hardware, and any operation performed directly by hardware can be done
    8·1 answer
  • how to make windows laptop work faster because I mine is so slowwwww. I already updated it and everything and tried everything b
    9·1 answer
  • Legends are titles given to three-axis X, Y, and Z-axis. True or false?
    6·1 answer
  • Task 2
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!