1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
4 years ago
8

Breaking down a problem to find the solution is called:

Computers and Technology
1 answer:
velikii [3]4 years ago
7 0
I would say B.......
You might be interested in
The best way to ensure the accuracy and safety of your accounts is to:
Gekata [30.6K]
Use symbols and a different password for each one

6 0
3 years ago
In G mail, when we want to write an email to multiple recipients in such a way that the recipients couldn't understand that we h
Inessa05 [86]

Answer:

Bcc

Explanation:

Every recipient email address you enter into the “to” and “cc” fields will be able to see each other. The email addresses you add to the “bcc” field will not be visible to the “to” and “cc” recipients or the other “bcc” recipients.

7 0
3 years ago
Read 2 more answers
What is one task of a system optimization tool?
8_murik_8 [283]

Answer: Identifies what apps start on boot

Explanation: sys opt tools find things that are slowing down your device so anything within that lens will work cleaning sys storage could also work as an answer

6 0
4 years ago
Read 2 more answers
An Al system provides grape growers with recommendations regarding pest management and fertilization. To which field does the ap
tatyana61 [14]
I think
A- computer vision
3 0
3 years ago
How telecommunications works?​
SIZIF [17.4K]

Answer:

Telecommunications are the means of electronic transmission of information over distances. The information may be in the form of voice telephone calls, data, text, images, or video. Today, telecommunications are used to organize more or less remote computer systems into telecommunications networks.

Explanation:

3 0
3 years ago
Other questions:
  • You have been asked to create an authentication security plan for your company. Which of the following components would you inco
    14·1 answer
  • Select the correct answer. Which sentence best describe an effective management strategy? A. Conceal game-related clippings prio
    12·2 answers
  • Stephen needs to insert a field into a building block that will contain variable data. Which keyboard shortcut can he use to tog
    6·1 answer
  • You want to find information about Paris, France in the last five years, written in English. What is the best way to search for
    5·2 answers
  • A file named numbers.txt contains an unknown number of lines, each consisting of a single positive integer. Write some code that
    11·2 answers
  • Plot absorbance versus concentration in μmol/L of the Tartrazine solution at the wavelength of the maximum absorbance of Allura
    10·1 answer
  • You are contacted by a project organizer for a university computer science fair. The project organizer asks you to hold a forum
    10·1 answer
  • Where can<br>а a<br>radio be found and how<br>they used​
    12·1 answer
  • It is where the home tab is located where you can view all the all the formatting purpose <br>​
    11·1 answer
  • Developing algorithms using psuedocode
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!