1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rina8888 [55]
3 years ago
12

Write a report on the recent online tuition

Computers and Technology
1 answer:
ale4655 [162]3 years ago
8 0

Answer:

dgvhgfh

Explanation:

fghdfgh

You might be interested in
Plagiarism occurs when writers
pentagon [3]

Answer:

<h3><em>A</em>- Use others' ideas and writing as their own</h3>

Explaniation:

it's plagiarism, just don't take other people's work and pass it as your own. smh lol

3 0
3 years ago
Read 2 more answers
Brief description email etiquette​
Solnce55 [7]

Answer: See explanation

Explanation:

Email etiquette is defined as the code of conduct which helps to guide the behavior when people send or respond to emails. Some of ail etiquette include:

• Using proper and correct grammar and punctuations.

• Replying quickly too emails.

• Including a clear and direct subject.

• Proofreading of messages.

• Cautious with humour.

• Sending of smaller files and compressing large files.

7 0
3 years ago
What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number o
marishachu [46]

The subnet mask can be utilized to segment the 172.16.0.0 network to qualify for a minimum of 6 subnets while maximizing the numeral of broadcasters per subnet is 255.255.224.0

<h3>What do subnet masks mean?</h3>
  • A subnet mask is a 32-bit numeral formed by setting keeper bits to all 0s and developing network times to all 1s.
  • In this way, the subnet mask divides the IP speech into the network and host addresses.
  • A subnet mask is used to separate an IP address into two pieces. One element defines the host (computer), and the different part identifies the network to which it belongs.
  • To better comprehend how IP lessons and subnet masks work, look at an IP speech and see how it's managed.

To learn more about  subnet mask, refer to:

brainly.com/question/3234986

#SPJ4

5 0
2 years ago
How did early games in generation 1 or 2 influence zelda botw
Novay_Z [31]

Answer:

Open world exploration and inventory management

Explanation:

In the first Zelda game (NES) and Zelda ii (NES) there were very early open world mechanics along with inventory management.

5 0
3 years ago
Read 2 more answers
Scott is inspired by one of his friends to write a research paper. how should he go about writing the research paper?
VLD [36.1K]

Scott first step is to ask people who are more educationally inclined in that filed about the work or use the internet or library to research on the topic or previous work that is done in that area.

<h3>What is a research paper?</h3>

This is known to be a kind of written essay on a topic that is done in depth.

Therefore, Scott first step is to ask people who are more educationally inclined in that filed about the work or use the internet or library to research on the topic or previous work that is done in that area.

Learn more about  research paper from

brainly.com/question/25257437

#SPJ1

4 0
2 years ago
Other questions:
  • How do air and ocean currents affect climate
    5·2 answers
  • Which question best helps a reader understand a plot’s exposition? What will life be like after the character takes action? How
    14·2 answers
  • Which of these is not a potential cause of data loss?
    7·2 answers
  • A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered f
    9·1 answer
  • The carbon-14 isotope is important because it allows scientists to determine the ___________ of an organic sample.
    14·1 answer
  • Using simplified language and numbers, using large font type with more spacing between questions, and having students record ans
    9·1 answer
  • Which federal legislation prohibits credit card companies from raising rates on existing balances?
    10·2 answers
  • Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
    5·1 answer
  • How do hand tools,Farm implements and farm equipment differ from one another
    6·1 answer
  • What is a BUG in terms of computer programming?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!