1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lord [1]
3 years ago
5

Help plz

Computers and Technology
1 answer:
Anarel [89]3 years ago
5 0

Answer: 1.) Collect the necessary ingredients and tools:

- jar of peanut butter

- jar of fruit jelly

- two slices of bread

- cutting board (larger that the combined surface areas of the slices of bread)

- butter knife

- tablespoon-sized spoon

2.) Place the cutting board on a stable surface, and the slices of bread side-by-side on the cutting board

3.) Open the jar of peanut butter.

4.) Using the spoon, scoop out 2 tablespoons of peanut butter and deposit in the center of one slice of bread [henceforth known as "Slice 1"].

5.) Using the knife, spread the peanut butter evenly across this side of Slice 1.

6.) Repeat steps 3-5, but with jelly instead of peanut butter and the slice of bread that is not Slice 1 [this second slice will henceforth be known to as "Slice 2"].

7.) Once Slice 1 and Slice 2 each have one side that is evenly coated with its respective spread (peanut butter or jelly), place Slice 2 on top of Slice 1 so that the spreads (peanut butter and jelly) are between the two slices and the externally-facing sides of each slice do not have spreads.

(ok so this is the best answer i can give u don't blame me if it's wrong)

You might be interested in
rue or false: The first web browser was introduced to the public in the 1970s and started the explosive growth of the Internet i
saw5 [17]

Answer:

false.

Explanation:

it was introduced in 1994

8 0
3 years ago
Computers are said to use binary data because all computer data is simply a series of Os and 1s.
Bingel [31]

Answer:

True

Explanation:

The option that answers the question is "True" and this is due to the fact that computers and computing devices represent data using 0s and 1s .

Although, the users of the computer do not have to study binary digits before they are able to interact with the computer, the computer itself can not function without binary digits.

So, for every input you pass to the computer, a translator translates it to binary for the computer to understand your input.

Hence, the statement in the question is true.

7 0
3 years ago
A new product was introduced in 2003, which functions as both an identification device and a medium of communication. It uses in
Svetllana [295]

Answer:

nTag

Explanation:

nTag describe -Providing information on freight limitations-Preparing documentation-Packing exhibit materials-Helping to ensure that shipments arrive on time.

5 0
4 years ago
Which institution developed outside the limits of the written costitution of the united states ?
nignag [31]
The answer is D. Electoral College
4 0
3 years ago
In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore dam
dexar [7]

Answer:

The answer is "Recovery Plan for Disasters".

Explanation:

In the given statement, some of the information is missing, which can be described as follows:

A) systems engineering plan

B) security compliance plan

C) risk assessment plan

D) Recovery Plan for Disasters

It is a set of guidelines for the execution of a recovery process, it provides the restoration and safety to the system for the organization in the event of a disaster. It defined as "a detailed summary of the appropriate acts to be carried out before, during and after a disaster", and incorrect choices were explained as follows:

  • In option A, It is used to design and analyze complex systems.
  • In option B, It provides frameworks for the corporate evaluation process.
  • In option C, It is used to identify the problems.
6 0
4 years ago
Other questions:
  • To change the background color of a page, which tab would you use?
    15·2 answers
  • What role do you think mobile devices have played in shaping the world?
    13·1 answer
  • Hybrid protocol is similar to which other protocol?
    10·1 answer
  • Garry is a record executive who is building a data table to include in a presentation about one of his artists. The table is mea
    15·1 answer
  • People using commercially available software are usually asked to read and agree to a(n) _____
    10·1 answer
  • All of the following are aspects of the search process except?
    6·2 answers
  • On the Format tab, which group allows you to select a different font for a chart?
    7·2 answers
  • Two technicians are discussing Newton's first law of motion. Technician A says that a lightweight vehicle requires as
    8·1 answer
  • I really need help in this!!!
    11·1 answer
  • You are the administrator for the ABC Company. You are looking to install Windows Server 2016, and you need to decide which vers
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!