1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wel
3 years ago
10

Jim wants to buy a car, but he’ll probably only need it for a couple of years. He has a short commute to work, so he won’t be pu

tting many miles on his vehicle. What’s the best transportation option for Jim
Computers and Technology
1 answer:
GalinKa [24]3 years ago
7 0
A Motorcycle would be a good option or get a bike.
You might be interested in
Which of the following tasks are suitable for creating an algorithm? Choose all that apply.
Nookie1986 [14]

Answer:

All except saving time writing a computer program.

3 0
2 years ago
Which of the following statements best describes how digital photographs can be used?
kipiarov [429]

Answer:

umm wheres the options so we can answer it and ty

Explanation:

3 0
3 years ago
Read 2 more answers
Give short answers.
Mkey [24]

Answer:

H) Well it depends how you put it. I'm Doing virtual School for my education. And it is so easy when we have technology out their to provide the help that we need. So I think it has affected education pretty good. You can Also google the answers.

I) Looking up Answers at home

J) Parents can check up on their child's school work and see if they can help them. Also The law is involved in Education.

K) It depend's on how you put it

Explanation:

Short Answers

6 0
2 years ago
Which of the following is true of mobile commerce (m-commerce) applications? a. They are supported by short-range wireless commu
KATRIN_1 [288]

Answer:

Option A: They are supported by short-range wireless communication technologies.

Explanation:

M-commerce is a progression of e-commerce which is being used on vast scale now-a-days like in online shopping, online payments etc.

  • As m-commerce applications have facilitated so much, they also support short ranged communication technologies such as Bluetooth which allows the connectivity to internet as well as offers sharing among different devices.
  • m-commerce applications are also compatible with 3G and 4G and even they have been promoted in a remarkable way. As these generations provide much faster speed and better connection, they have added much more to the business.
  • m-commerce applications don't rely on voice recognition or text-to-text speech as they bother not to know who actually is interested. They rather make sure of payment methods to make the payments secure and certain.
  • The m-commerce is totally free from wired protocols as it uses handheld devices including cell phones, tablets or laptops. So that the mobility is ensured.
5 0
3 years ago
You can separate words in a macro name by using the ____ character
Maru [420]
You can separate words in a macro name by using the underscore character.

A macro is considered as a small reusable computer program. It is efficient as it helps you save time by automating any repeated task.
In order to create a macro, you do not need to be an expert in programming, however, a little knowledge about it will help.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is the path to the zoom button? select one:
    5·2 answers
  • An operating system coordinations the___ of a computers operation
    8·1 answer
  • - If we place records from different tables in adjacent____________, it would increase efficiency of a database.
    14·1 answer
  • Compare and contrast the role that business users play when software is developed using Waterfall and Agile software development
    10·1 answer
  • Create a trigger that prevents anychange(insert, update, or delete)to the grade attribute of the takesrelation that would change
    14·1 answer
  • Which component of service-oriented DSS can be defined as data that describes the meaning and structure of business data, as wel
    9·1 answer
  • Help it's the last question quickkk​
    7·1 answer
  • The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's softw
    8·1 answer
  • Use a while loop to output the even number from 100 to 147? This is python
    10·1 answer
  • failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!