1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frez [133]
3 years ago
7

How much will your assignment be docked if you turn it in late?

Computers and Technology
2 answers:
o-na [289]3 years ago
7 0
We don’t know ms.Fredrick, you’re on your own here
dimaraw [331]3 years ago
3 0

Answer:

This would be a classroom discussion, But here ill try I guess,

Maybe  None since Ms. Frederick doesn't accept late work  because I dont know her

You might be interested in
Which option can you use to control how text flows around a graphic?
Art [367]

Answer:

I believe your answer is C: Wrap Text

Explanation:

If you are trying to put an image in a more specific placement you would use Wrap Text. It helps making the image more clear and understandable because without wrapping the text it wouldnt make any sense and it would just be plain.

Hope this helps

3 0
3 years ago
Read 2 more answers
Cindy wants to send threat information via a standardized protocol specifically designed to exchange cyber threat information. W
Dahasolnce [82]

Cindy  can choose to exchange cyber threat information in the given scenario via the use of TAXII.

<h3>What is standardized protocol?</h3>

Standardized protocols is known to be the one that gives room for people or clients to communicate with any given window manager.

Note that in the above case, Cindy  can choose to exchange cyber threat information in the given scenario via the use of TAXII.

Learn more about standardized protocol from

brainly.com/question/14672166

#SPJ1

8 0
2 years ago
When a computer is the.................of an attack, it is used as an active tool to conduct the attack
BARSIC [14]

Answer:

Attack is an intentional or unintentional act that causes damage or compromises information of systems supporting it.When a computer is the subject of an attack, it is used as an active tool to conduct the attack.

On the other hand, when a computer is the entity being attacked, it is the object of an attack.

3 0
2 years ago
True or False
Sonja [21]

Answer:

number 1: true

Explanation:

2: true

3: false

4: true

5: true

6: false

7: true

8: false

9: false

10: saver

11: false

please put me as meilleur réponse

6 0
2 years ago
Read 2 more answers
What is the output?
yuradex [85]

Answer:

this is x,y correct?

well if it is then wouldnt it be 5,30?

8 0
3 years ago
Other questions:
  • Uses of keyboard as a input device
    13·2 answers
  • 6 The part of the computer that contains the brain or central processing unit is also known as the ?
    11·1 answer
  • Carol typed a memo to send to everyone in her department. To create this memo, she used a _____. spreadsheet word processor fax
    10·2 answers
  • Explain demand paging with a proper example
    8·1 answer
  • Given the following code fragment and the input value of 4.0, what output is generated?
    8·1 answer
  • Write a recursive function that returns true if the digits of a positive integer are in increasing order; otherwise, the functio
    15·1 answer
  • Technician A says that a system should be recharged with refrigerant until the condenser temperature is equal to the ambient tem
    9·1 answer
  • Adobe Indesign project 4 museum indesign file. The instructions are 70 pages long I cant sit still long enough to read them
    11·1 answer
  • The term for an operator that may not evaluate one of its subexpressions is
    14·1 answer
  • Use HTML and CSS, create a web page for the table shown below. Please copy (and paste) your code from your text editor (Replit).
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!