1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VladimirAG [237]
3 years ago
7

When workers use techology to work from home or an office center, they are

Computers and Technology
2 answers:
dem82 [27]3 years ago
8 0

Answer:

Electronically

Explanation:

Hope this helps

scoray [572]3 years ago
3 0
They are Working from home
You might be interested in
The four differences between binary and denary​
Andrei [34K]

Explanation:

Binary and denary

A number base indicates how many digits are available within a numerical system. Denary is known as base 10 because there are ten choices of digits between 0 and 9. For binary numbers there are only two possible digits available: 0 or 1. The binary system is also known as base 2.

mark me brainliest please

8 0
3 years ago
Madison works for Google as an Ethical Hacker. Madison main job responsibility is
Ivenika [448]

Answer:

to evaluate the security and identify vulnerabilities of a business

Explanation:

Madison is an ethical hacker (white hat hacker), meaning she is hired by companies to make sure that "evil" hackers (black hat hackers) can't hack into their websites.

7 0
3 years ago
Read 2 more answers
Id is 960 1788 6557 <br><br> pass is nick2020 <br><br> anybody can join
EleoNora [17]

Answer:

what is this a zoom a kahoot or what

3 0
3 years ago
To make your brand colors stand out, it is important to implement what with your color scheme?
qaws [65]

Answer:

All of the above

Explanation:

It's better to have a pattern of colors than one single color in you color scheme.

6 0
3 years ago
Read 2 more answers
Which of the following is a goal of summarizing? to quote the main idea of what you have read, giving credit to the original sou
Tanya [424]
<span>to review the most important supporting points from the original information I believe is the answer

</span>
7 0
3 years ago
Other questions:
  • Why is RAM used for temporary storage!
    6·1 answer
  • Professor Zak allows students to drop the four lowest scores on the ten 100 point quizzes she gives during the semester. Design
    13·1 answer
  • Does anyone know how to cancel a Pandora Free Trial Subscription? I need to cancel it by tomorrow. Please help!
    12·1 answer
  • Motorcyclist might make an adjustment in speed when encountering ?
    7·2 answers
  • Wireless data networks are particularly susceptible to known ciphertext attacks.
    10·1 answer
  • What is distribution hardware?
    14·1 answer
  • Analyze the code and identity the value of variable a,b and c after the code execution. int a=40, b=50, c=60; if(! (a&gt;=40)) b
    15·1 answer
  • Write two eaxmple of operating system​
    14·2 answers
  • Which of the following statements best describes the relative amount of content held by digital libraries vs. the amount held by
    15·1 answer
  • What is the most appropriate data type for each of these items?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!