1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Veseljchak [2.6K]
3 years ago
9

What is one benefit of using electronic sticky notes ?

Computers and Technology
2 answers:
balu736 [363]3 years ago
4 0
They can be used to just copy/paste e-mailed information without writing down on a paper and losing valuable time. This is one example.
kakasveta [241]3 years ago
4 0

Answer:

A. They can be used to jot down messages.

Explanation:

Your welcome!

You might be interested in
All of the following are standards that enable programs to receive data from and display data to a variety of mobile and desktop
svp [43]

Answer:

AOL

Explanation:

Some of the standards that enable programs to receive data from and display data to a variety of mobile and desktop devices includes;

I. CSS 3: it is a framework used for providing various styles used in web design.

II. HTML 5: this is a hypertext markup language used for creating web pages or website.

III. Javascript: it is a software framework that allows software components to send and receive data through a database.

IV. Service oriented architecture (SOA): this is an architectural pattern which allows various software application components to provide specific services to other applications through a network.

All of the following standards listed above enable programs to receive data from and display data to a variety of mobile and desktop devices except AOL. AOL is an acronym for American Online and it is typically used for providing internet connection through a dial-up.

3 0
3 years ago
Read 2 more answers
A _____ virus uses the language of an application that records a sequence of keystrokes and instructions in an application, such
docker41 [41]

Answer: macro virus

Explanation:

The virus that uses virus uses the language of an application which is vital in recording the sequence of the keystrokes and the instructions in an application, like spreadsheet or the word processing in order to hide virus code is the macro virus.

A macro virus is simply a computer virus which is written in same macro language that is being used for software programs. When a software application is being infected by the macro virus, it leads to a sequence of actions which automatically start when the application is being opened.

6 0
2 years ago
Directions: Using the decoder key and the code chart on the second page, find out the name that has been coded. After coding the
Karo-lina-s [1.5K]

What is the decodder key???

7 0
3 years ago
When VPN network traffic is routing only some traffic over the secure VPN while other traffic directly accesses the Internet, wh
stiv31 [10]

Answer:

split tunneling

Explanation:

Based on the information provided within the question it can be said that in this scenario the type of technology being used is known as split tunneling. Like mentioned in the question this refers to when a user is able to access different security domains such as a public network and a WAN at the same time. This can either be done with the same or different network connections.  

3 0
3 years ago
Define a toString prototype method that returns the cat's name, gender, and age separated by semicolons.
nexus9112 [7]

Answer:

Following are the program to this question:

import java.util.*;//import package for user input

public class Main//defining main class

{

public static String Cat (String name, String gender, int age)//defining string method Cat that accept parameter value

{

return name + ';' + gender + ';' + age;//return parameter value

}

public static void main(String[] args) //defining main method

{

   String name,gender;//defining String variable

   int age;//defining integer variable

   System.out.println("Enter name, gender and age: ");//print message

   Scanner obx=new Scanner(System.in);//creating Scanner class object for user input

   name=obx.next();//input name value

   gender=obx.next();//input gender value

   age=obx.nextInt();// input age value

   System.out.println(Cat(name,gender,age));//print return method value

}

}

Output:

Enter name, gender and age:  

dani

Female

12

dani;Female;12

Explanation:

In the above-given code, a string method Cat is declared, that accepts three variable "name, gender, and age", inside the method return keyword is used that returns the parameter values.

In the main method, the above parameter variable is declared, which is used to input value from the user-end, and used the print method to print its return value.

6 0
2 years ago
Other questions:
  • What is the data rate of a DS0 signal?
    10·1 answer
  • What does software alone enable a computer to do? connect to the Internet control processing speeds interact with the user manag
    11·2 answers
  • Find meanings for the words and give examples where you can<br><br> WORTH 30 points
    12·1 answer
  • What should you do if ads keep popping up on your computer when using Google Chrome?
    14·1 answer
  • What enables a website to recognize a computer as a return visitor (as opposed to a first-time visitor)?
    12·1 answer
  • 1| def saveUserProfile(firstName, lastName, age, height, country):
    7·1 answer
  • PLEASE HELP!! WILL MARK BRAINLIEST!!
    9·1 answer
  • I want to solve this question in C program, Please.
    7·1 answer
  • A mom is planning a theme park trip for her husband, herself, and their three children. The family has a budget of $500. Adult t
    6·1 answer
  • Explain the characteristics of 1st generation computers​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!