1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Montano1993 [528]
3 years ago
13

Create a bulleted list of four descriptive terms describing possible values a person may have. These may be your own values, or

they may be values another person could have. Complete sentences are not necessary.
Computers and Technology
1 answer:
Minchanka [31]3 years ago
7 0
Create a bulleted list of four descriptive terms describing possible values a person may have.

* always be true to yourself
* honesty is the best policy
* making mistakes leads you to solutions
* it's ok to be wrong
You might be interested in
A ____ network (or workgroup) consists of multiple windows computers that share information, but no computer on the network serv
ra1l [238]
<span>A peer-to-peer network (or workgroup) consists of multiple windows computers that share information, but no computer on the network serves as an authoritative source of user information. domain-based peer-to-peer server-based centralized</span>
5 0
3 years ago
Henry wants to create a presentation for his clients. He wants to upload the presentation file directly to the Internet. Which p
Ierofanga [76]

Answer:

styrofoam and petroleum

Explanation:

8 0
1 year ago
Threads can only be added to cylindrical faces.<br> O True<br> O False
Nikolay [14]

Answer:

I would say false

Explanation:

Threads can be add to anything there is no say in where you should add the thread and into what

4 0
2 years ago
Swapping two numbers
Tju [1.3M]

Answer:

Swapping two numbers means exchange the values of two variables with each other.

8 0
3 years ago
A database planner names a field “Organic ingredients_3”. Why would this name Create possible problems in programming?
o-na [289]

Answer:

I think the answer is 2.

hope it will help you

4 0
2 years ago
Read 2 more answers
Other questions:
  • Which of the following STEM discoverers developed a new type of computer hardware?
    11·1 answer
  • The process of searching for a special pattern of symbols within a larger collection of information is called pattern ____.
    12·1 answer
  • Web browsers are used to browse the world wide web.
    5·2 answers
  • Lisa has a section of her document that she would like to include in the index. Which option should Lisa choose?
    5·2 answers
  • O Why was the Internet originally constructed? Oto enable researchers to communicate
    6·2 answers
  • In 1981, the first digital icons were launched for users in _________, which was the first computer with a GUI operating system.
    12·1 answer
  • What is pseudo code?
    11·2 answers
  • You are the IT administrator for a small corporate network. The employee in Office 2 is setting up a virtualization environment
    10·1 answer
  • When one loop appears inside another, the loop that contains the other loop is called the ____ loop. Group of answer choices ind
    15·1 answer
  • Viruses that load from usb drives left connected to computers when computers are turned on are known as.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!