1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadezda [96]
3 years ago
8

Join zoom meet id=547 458 9345pw=sencHURI​

Computers and Technology
2 answers:
Julli [10]3 years ago
7 0

Answer:

you're joking here lol

amm18123 years ago
7 0

Answer:

im not joining

Explanation:

You might be interested in
Describe Ms word environment.​
Alexeev081 [22]

On Microsoft Word, you can edit your Word.... You can add pictures, do journals, do menus, and stuff like that... You can add color to text, make lists, add shapes to your Word, etc...

8 0
3 years ago
Elena is used to kissing her friends on both cheeks as a form of greeting in her native country. She notices that her new friend
Veseljchak [2.6K]

Answer:

c. Norms.

Explanation:

When Elena noticed her friend getting uncomfortable when she kisses him on the cheeks as a form of greeting she was violating his norms.

Norms are something that is standard or typical.

In USA there they not used to kiss on the cheeks to greet their friends there would be some other norm of greeting someone.

5 0
4 years ago
The following are reasons why many organizations are trying to reduce and right-size their information foot-print by using data
blagie [28]

Answer:

C.<em> improve data quality and reduce redundancies, reduce increased and staggering storage management costs</em>

<em></em>

Explanation:

Excess data retention can lead to retention of redundant and irrelevant data, which can reduce data handling and processing efficiency, while at the same time increasing the cost of data storage and management. This can be curbed be reducing data to the right size by using data governance techniques like data cleansing and de-duplication

6 0
4 years ago
Two types of business communications enhanced by desktop publishing are
Likurg_2 [28]
The correct option is D.
The two types of business communication that are enhanced by desktop publishing are internal and external communication. Internal communication refers to the information and ideas that are exchange within the organisation while external communication refers to information and ideas that are exchange between the organisation and the outside world.<span />
4 0
3 years ago
Read 2 more answers
An alternative to hexadecimal notation for representing bit patterns is dotted decimal notation in which each byte
zysi [14]

An alternative to hexadecimal notation for representing bit patterns is dotted decimal notation in which each byte in the pattern is represented by its base ten equivalent. In turn, these byte representations are separated by periods. For example, 12.5 represents the pattern 0000110000000101 (the byte00001100 is represented by 12, and 00000101 is represented by 5), and the pattern 100010000001000000000111 is represented by 136.16.7. Represent each of the following bit patterns in dotted decimal notation,

a. 0000111100001111 b. 001100110000000010000000c. 0000101010100000

4 0
3 years ago
Other questions:
  • List and the deference between MS access objects​
    8·1 answer
  • In which situation will file compression be required to complete the task
    15·1 answer
  • What is performance? Multiple Choice measures how quickly a system performs a process or transaction a system that is not operat
    9·2 answers
  • What natural resource are available on the coast but not somewhereelse
    13·1 answer
  • #Write a function called "replace_all" that accepts three #arguments: # # - target_string, a string in which to search. # - find
    11·1 answer
  • Why are medical related professions and human resources important? ​
    8·1 answer
  • What keyword must be used on any method (function) on your class that is called from your main() method?
    15·1 answer
  • 1
    13·1 answer
  • Buying a home security system is an example of protecting your home against________.
    5·1 answer
  • In which wireless configuration type do nodes communicate directly with each other, rather than with an access point?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!