1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
2 years ago
13

Assignment

Computers and Technology
1 answer:
Helen [10]2 years ago
4 0
1. A.state the formula for finding the perimeter of a Rectangle that is 2(L+W)
B.Add both lengths
C.Add both widths
D.sum up the value had on both length and width
You might be interested in
According to your textbook, the three major criteria against which to test documents that you locate on the Internet are authors
pantera1 [17]

Answer:

The following statement is False.

Explanation:

Because asper textbook there are only one main criteria against the test documents that find on the internet i.e., authorship. So, that's why the following given statement is false. The graphic and the interactivity depends on the quality of the document this options do not come under the criteria to test the document.

6 0
3 years ago
Will Give Brainliest!
liraira [26]

You have to wait a little bit until you can give the person brainiest. You mostly give it to someone who gave a great answer. :)

7 0
3 years ago
Read 2 more answers
Raul needs to ensure that when users enter an order into the tblOrders, the shipping date is at least two days after
bagirrra123 [75]

Answer:

input mask

Explanation:

Microsoft Access is a database application used to stored data. It is a relational database with rows and columns of data tables in its database.

Data validation is a tool in Access used to put a constraint on how data is entered in the table. The input mask is a data validation type that forces users to enter data in a specified format for a given field or column.

7 0
2 years ago
Read 2 more answers
Choose the two main capabilities involved in visual literacy
andreyandreev [35.5K]

The two main capabilities involved in visual literacy are:

<span>1)   </span>Communication through use of visual elements.

<span>2)   </span>Interpret meaning from visual elements.

<span>Visual literacy is the capacity to decipher, arrange, and make significance from data displayed as a picture, broadening the importance of proficiency, which means understanding of a composed or printed content.</span>

7 0
3 years ago
While a threat intelligence analyst was researching an indicator of compromise on a search engine, the web proxy generated an al
inna [77]

Answer: the corret answer C. The analyst has prefetch enabled on the browser in use.

Explanation:

The analyst has like an indicator which is prefetch enabled on the browser in use.

7 0
3 years ago
Other questions:
  • True / False<br> Registers are generally optimized for capacity instead of speed.
    14·1 answer
  • Your mom wants to purchase a computer. She has heard about how the Windows 8 operating system is best-geared for a touch-enabled
    8·1 answer
  • Direct connections provide continuous access to the Internet. Many bandwidth options are associated with direct connections. Whi
    9·1 answer
  • Why are you unable to modify the budget file, when you have the allow full control ntfs permission?
    5·1 answer
  • Which of the following is defined as the elastic leasing of pooled computer resource over the Internet? 1) Broadband 2) Wiki 3)
    13·1 answer
  • All states that have altered judicial selection techniques in recent years have adopted some form of:
    5·1 answer
  • I'm gonna get grounded for getting a 52 on my test :(
    13·1 answer
  • (I need help also can u guys just give me some example just in case I got confuse)
    13·1 answer
  • Select the correct answer. Which is the bottom-most layer in the OSI model?
    9·1 answer
  • Is monitor is a television​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!