1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
2 years ago
8

Ria and her team ....................... they will win. *

Computers and Technology
1 answer:
Masteriza [31]2 years ago
5 0
Think its A ITS AAAAAAAAA
You might be interested in
You can use the_______key if your cursor is at the end of the word. Use the______key if you place the cursor on the left side of
Bezzdna [24]

You can use the Home key if your cursor is at the end of the word. Use the End key if you place the cursor on the left side of the word.

The Home and End keys are called the function keys. They act as functions and do not produce characters when pressed. Function keys move the cursor when you are creating or editing a document. The Home key moves the cursor at the beginning of a line in a word or a sentence and the End Key place the cursor at the end of the line.


8 0
3 years ago
A ____ by a design professional is used to determine the best system to provide the appropriate level and type of protection.
AleksAgata [21]
A HAZARD EVALUATION by a design professional is used to determine the best system to provide the appropriate level and type of protection. Hazard evaluation involves systematic identification and analysis of hazards that are associated with a particular product or process. This gives one the opportunity to avoid these hazards.  
8 0
3 years ago
Where (what memory location) is the data read from for the following code:
alexdok [17]

Answer: ORG $3000 tell us that we want to load the program from the address $3000.

LDAA #$C2 tell us to load the value contained in the address present in the register C2 into the accumulator.

Explanation:

ORG instruction in  microprocessor does not have a fixed address. It tell us where to begin the execution of the program by loading into a starting address space. It does not uses fixed addressing

LDAA instruction uses indirect addressing by placing the value from the address present in the register. Here  the address is contained in register C2.

6 0
3 years ago
A password checking system that disallows user passwords that are proper names or words that are normally included in a dictiona
nikdorinn [45]
The answer is control
7 0
3 years ago
Give an example of an occasion when you used logic to solve a problem
netineya [11]
You can use it when like confirming a policy
8 0
3 years ago
Other questions:
  • Two or more computers that transfer information between computers are called a
    7·1 answer
  • How to go to a website with an ip address?
    15·1 answer
  • How does technology set a negative impact on the adolescent of our society?
    14·1 answer
  • ----------HELP WITH 3 QUESTIONS FOR 30 POINTS!!!---------
    6·1 answer
  • Lucy wants to develop a web page to display her profile. She wants to just start with a basic page that lists her accomplishment
    13·1 answer
  • Hi, I just have a few questions from my digital tech assignment.
    14·2 answers
  • Why computer literacy is vital to access in business work
    7·1 answer
  • How does a project charter support the project manager in getting things for the project from other people?
    6·1 answer
  • Working with text in presentation programs is very ____ using text in other applications.
    10·1 answer
  • How is technology moving the business world forward?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!