1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
givi [52]
2 years ago
9

If you want to transfer information transform STM to LTM, it is essential that you make the information ______________________.

Computers and Technology
1 answer:
olga nikolaevna [1]2 years ago
3 0

Answer:

It honestly depends on what the information is hopefully that helps?

Explanation:

You might be interested in
Henry is designing a document for his architecture project. In which order should Henry preform the different tasks that are req
nadezda [96]

It is

Select an appropriate layout

Decide which current format...

Import or compose...

Proofread...

Check the print preview..

4 0
3 years ago
What are the reasons why is it necessary to evaluate online sources and content?
marissa [1.9K]
1) You don't know if the source is reliable. 
2) It is better to cite reliable sources so.
7 0
3 years ago
Ask the user to enter a number. Display whether the number is odd or even. computer science answers
notsponge [240]

Answer:

Write a C program to check whether a number is even or odd using if else. How to check whether a number is even or odd using if else in C program. C Program to input a number from user and check whether the given number is even or odd. Logic to check even and odd number using if...else in C programming.

Explanation:

6 0
2 years ago
Read 2 more answers
With internet access you can send e mail to any computer in the world true or false
Salsk061 [2.6K]

Answer:

true

Explanation:

I think this answers is right

5 0
3 years ago
Read 2 more answers
Funny or fascinating web content is said to go _________ when it is shared and re-shared a large number of times over a short pe
beks73 [17]
It is said to go viral?
4 0
3 years ago
Other questions:
  • When you add an rss feed to hootsuite publisher, posts from blogs and websites you designate will be?
    5·1 answer
  • Write c program to check character is alphabate or not?​
    15·1 answer
  • An example of software most commonly associated with productivity software is ____.
    12·1 answer
  • Intro to cs 3.7 edhesive g=float(input("Enter your English test grade:")) if(g<=64): print("F") if (g>=65 and g<69): pr
    11·1 answer
  • Write a C program to implement a command called ​displaycontent ​that takes a (text) file name as argument and display its conte
    9·1 answer
  • A sequence of one or more characters is called
    14·1 answer
  • A _____ attack floods a network or server with service requests to prevent legitimate users' access to the system. phishing back
    5·1 answer
  • What are the major functions of a computer
    7·1 answer
  • Suppose the fixed width of an aside element in a fixed layout is 300 pixels, and the fixed width of its parent element (body) is
    15·1 answer
  • Select two netiquette guidelines. In three to five sentences, explain why these guidelines make professional online communicatio
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!