1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol13
3 years ago
11

Why does everyone refer to dogs as being loyal

Computers and Technology
2 answers:
LenKa [72]3 years ago
7 0

Explanation:

Because they're like another member of the pack.

uranmaximum [27]3 years ago
6 0

Answer:

Cause dogs are indeed loyal

Explanation:

You might be interested in
The inventory tracking system shows that 12 laptop were on hand before a customer brings two laptops to the register for purchas
Bingel [31]

Answer:

Inventory errors can cause mismatches between the real numbers of the company, to avoid this you must use software that allows you to avoid these errors.

Explanation:

There is <u>software that line</u> (in the cloud), which is not necessary to install directly on a laptop or server.

Software examples for optimal inventory management:

1. ERP software in the cloud (it is an enterprise resource planner), it is flexible and low cost.

2. my MANAGEMENT

3. Crol

4. bind ERP (for SMEs)

5. Cloudadmin

6. Multi-commerce (license required).

6 0
3 years ago
Customer A with a Bronze service level package calls in a Critical System Failure at 9:00 AM. Customer B with a Silver service l
inysia [295]
This question depends on what the service level packages have to offer as an agreement. Does this question come with a list of what the service levels have to offer?
4 0
3 years ago
What is the best method to avoid getting spyware on a machine
monitta

Answer: The best method to avoid getting spyware on a user machine is to download software only from trusted websites. And depending on the machine it might say that "This download you are about to install might have spyware or malware and it might infect your laptop" "Do you wish to continue?"

3 0
2 years ago
Which action could be used to determine if a host is compromised and flooding traffic onto the network?
timofeeve [1]

<span>Disconnect the host from the network. 
</span><u>if that doesnt work then try these options</u> 
Check the host hard drive for errors and file system issues.
<span>Examine the Device Manager on the host for device conflicts
</span>Unseat and then reconnect the hard drive connectors on the host.

4 0
3 years ago
A USB is used for _________.[ pick the best answer that makes sense]
Nookie1986 [14]
<span>B) storing information and documents, pictures</span>
4 0
3 years ago
Read 2 more answers
Other questions:
  • Please help me I just bought a camera and I really wanna shoot in manual mode but I have like the basics down Shutter speed is l
    9·1 answer
  • The Internet shopping cart is an example of which version of the web?
    15·1 answer
  • In C, developers may access arrays via bracketed syntax like Java or by using * dereferencing notation. The following assignment
    5·1 answer
  • Calculate the change in RGDP if the MPC is .6 and initial spending is $500,000.
    8·1 answer
  • As defined by the National Institute of Standards and Technology​ (NIST), "________ is a model for enabling​ ubiquitous, conveni
    11·1 answer
  • 01:24:3
    11·1 answer
  • Who wants brainlyest! NO LINKS how do you message someone on brainly
    10·2 answers
  • How does this happen on brianly???
    5·2 answers
  • What do you call a collection of pre-programmed commands and functions used in programs?
    10·1 answer
  • RTOS stands for ______ Time Operating System.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!