1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alja [10]
4 years ago
15

You might have trouble interpreting a message if:

Computers and Technology
1 answer:
Lina20 [59]4 years ago
6 0

Answer:

The answer is both B and C.

Explanation:

You might be interested in
Disadvantage do you think one can have if he or she does use electronic media
Dima020 [189]
- discontinuity
- dependence on the electric power
and more
6 0
3 years ago
Which type of software is primarily used to organize a collection of information for easy access?
weeeeeb [17]
Database - you could also use a spreadsheet but you can't ask questions that you can with a database
4 0
3 years ago
Is it ok to use a does red wine clean the inside of a computer true or false
Dmitry [639]
I don't understand what you are saying but I'm willing to help
4 0
3 years ago
Read 2 more answers
How many bits are in the host portion of the address 192.168.150.19/23?
Alecsey [184]
23 bits are the network mask, so 32 - 23 bits are the node number.
3 0
3 years ago
Ms. Osteen gives her class an assignment to insert background color that gradually changes from blue to green. To accomplish thi
irina1246 [14]

Answer:

C

Explanation:

7 0
3 years ago
Other questions:
  • In 1–2 sentences describe the purpose of comparison operators and give an example.
    10·1 answer
  • Which best explains a password attached to a document
    9·1 answer
  • Design a program that will receive a valid time in the 24-hour format (e.g. 2305) and convert to its equivalent 12-hour format (
    14·1 answer
  • What are like arms surrounding all the other code blocks?
    11·2 answers
  • Sketch f(x) = 5x2 - 20 labelling any intercepts.​
    13·1 answer
  • Circle class
    11·1 answer
  • What is a valid response when identity theft occurs
    10·1 answer
  • Why should teachers refrain from using extreme language, such as “I’m dying of hunger,” around four- and five-year-old children?
    9·1 answer
  • Using an open connection to a small company's network, an attacker submitted arbitrary queries on port 389 to the domain control
    5·1 answer
  • Technical safeguards involve the hardware and software components of an information system. group of answer choices true false
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!