1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
2 years ago
15

Which of the following is not a characteristic of a good value log entry

Computers and Technology
1 answer:
Stolb23 [73]2 years ago
6 0
What are we supposed to find? Help us
You might be interested in
Which is a monthly cost associated with renting a house?
Evgesh-ka [11]
The answer is a. utility bills
8 0
3 years ago
Read 2 more answers
Which wireless communication technology is most likely used when synchronizing device information to an automobile?
seropon [69]
Bluetooth is the most reasonable answer
8 0
3 years ago
Transition words and phrase in a paragraph
balandron [24]

Answer:

Msms

Explanation:

8 0
3 years ago
Read 2 more answers
What is the best game of 2020 in pc​
dybincka [34]

Answer:we have games like alien wars call of duty astro avengers

Explanation:8

8 0
3 years ago
Read 2 more answers
What is one way to measure technological progress?
OLga [1]
You can measure it by the amount of automatisation. The bigger technological process the easier it is to automate systems.
4 0
3 years ago
Other questions:
  • Running fewer applications at once is a way to resolve which type of bottleneck?
    9·1 answer
  • Why is there more content on youtube in 4k then there is on cable, satellite, and digital tv combined?
    6·2 answers
  • What country is now the number one source of attack traffic?
    5·1 answer
  • To what extent can u justify that computer is not the only ICT tool?​
    9·1 answer
  • What is a seismogram?
    9·1 answer
  • Which of the following is a web app?
    5·1 answer
  • Which is a common problem for inserting pictures into placeholders?
    10·1 answer
  • No production Web application, whether it resides inside or outside of the firewall, should be implemented without:
    6·1 answer
  • 2.13 LAB: Branches: Leap Year
    11·1 answer
  • Which of the following variable names follows the rules for naming variables?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!