1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lina20 [59]
4 years ago
14

Need Help ASAP!

Computers and Technology
2 answers:
kifflom [539]4 years ago
7 0

Answer:

the first one, second, and the 5th one

Explanation:

jonny [76]4 years ago
3 0

Answer:

Ask about next steps and the best way to communicate.

Send a follow-up email within 24 hours.

Explanation:

You might be interested in
Which of the following best explains how symmetric encryption are typically used?
Y_Kistochka [10]

A: Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

6 0
3 years ago
Size of a MAN can range from ​
Dovator [93]

Answer:

According to the latest CDC stats, these are the average heights for U.S. adult men based on age:

Ages 20 to 39: 176.1 centimeters

Ages 40 to 59: 175.8 centimeters

Age 60 and older: 173.4 centimeters

6 0
4 years ago
Which kind of results will appear using the search query "Frosty the Snowman" in quotation marks?
Citrus2011 [14]
The correct Answer is B
6 0
3 years ago
The variables within the class all are related to help describe the object.
lawyer [7]
This does not make sense
3 0
3 years ago
which field in the contact form is used to control the order in which contacts are displayed in the current view
Bond [772]

Answer: File As is used to control the order in which contacts are displayed in the current view

4 0
3 years ago
Other questions:
  • 2. Write the binary representation of number 1037.379 in IEEE 754 standard in single precision. Express the result in binary, oc
    7·1 answer
  • Disk scheduling algorithms in operating systems consider only seek distances, because Select one: a. modern disks do not disclos
    13·1 answer
  • Write a program that does the following: • Alphabetizes a list of small (non-capital) letters. For consistency, make the string
    14·1 answer
  • Read the following scenario, and then answer the question below.
    15·2 answers
  • A user found that their personal data had been exfiltrated from their computer by a malicious program that they clicked on sever
    12·1 answer
  • How can you ensure you don't go over your budget?
    8·1 answer
  • Using bearings will cause more friction. Group of answer choices True False
    10·1 answer
  • In this lab, you complete a C++ program that swaps values stored in three int variables and determines maximum and minimum value
    15·1 answer
  • A test's directions often clarify any questions a student might have about answering a response question.
    5·2 answers
  • which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!