1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
3 years ago
7

How much does a dodge tomohawk cost for a used one?

Computers and Technology
1 answer:
Ratling [72]3 years ago
5 0
$500,000 to $700,000
You might be interested in
Why are variables useful in programming?
levacccp [35]
Variables can be useful because they hold a certain number/data value that can easily be accessed and changed. For example, in a game, a players score is a variable that changes as the player gets more points; ie coins, items, etc.

4 0
3 years ago
Read 2 more answers
When it comes to collecting and organizing prospect and account​ information, salespeople have a large variety of computer syste
OleMash [197]

Answer:

sales force automation systems

Explanation:

Based on the information provided within the question it can be said that in this scenario these are known as sales force automation systems (SFA). This type of system or software is used in order to automate various business tasks, including managing contacts, order processing, sales, inventory, etc. Which is why it is mostly used by the salespeople.

4 0
3 years ago
A friend emails a presentation to isabella to view. what kind of change can she make?​
fiasKO [112]

Answer:

She can enable editing. She can change the view.

Explanation:

6 0
3 years ago
To create a public key signature, you would use the ______ key.
olya-2409 [2.1K]

Answer:

To create a public key signature, you would use the <u>_private_</u> key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

4 0
3 years ago
Formatting changes only the appearance of data ___it does not affect the data itself.
Vladimir [108]

Answer:

The answer to this question is "true".

Explanation:

In this question, the answer is true because The use of formatting provides changes in the data presentation, not in the data. It is also known as layout.

The layout or formatting is important for two reasons that can be given as:  

1) It makes your data like a formatted data.

2) It helps to make your data more readable.

8 0
3 years ago
Other questions:
  • Why would an over the shoulder shot be used
    11·1 answer
  • If the pc­doctor software is installed on a computer's hard drive, what two different ways can the program be started?
    7·1 answer
  • Create a program the outputs the total cost of a lunch order. Users should be prompted to input the number of hamburgers, fries,
    6·1 answer
  • Importance of availability of mobile devices content that is of interest for users.
    12·1 answer
  • Python 3 (not java)1.Assume that word is a variable of type String that has been assigned a value. Write an expression whose val
    14·1 answer
  • What does 69 mean?<br> Whenever I watch memes they always talk about the number 69
    8·2 answers
  • In the early 1800's, a “computer" was not a machine, it was a person who did math
    8·2 answers
  • Which of the following statements is/are correct? a. At the network layer, entitlement can map identity and/or attributes to fun
    8·1 answer
  • what impact of information communication technology have on the environment about electronic waste, use of electricity?​
    9·1 answer
  • You must configure a certificate authority on your network to use EFS. True or False?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!