1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natta225 [31]
2 years ago
14

PLEASE HURRY I WILL GIVE BRAILIEST TO WHO EVER ANSWERS AND IS CORRECT

Computers and Technology
2 answers:
Valentin [98]2 years ago
5 0

Answer:

Accessible twenty-four hours per day and seven days per week

Quick and easy sharing

Document sharing

torisob [31]2 years ago
4 0

Answer:

B, D, E is the answers I think

You might be interested in
The equipment that processes data in order to create information is called the _______.
Naily [24]
The equipment that processes data in order to create information is called the hardware.
6 0
3 years ago
Read 2 more answers
Why do my airpods keep disconnecting from my laptop
user100 [1]
Hmm well maybe there is bad Bluetooth connection coming from the laptop
7 0
2 years ago
Read 2 more answers
What is the term for the error caused when one end of an unshielded twisted-pair (UTP) cable is terminated in the T568A configur
FinnZ [79.3K]

Answer:

A transposition is the correct answer.

Explanation:

A transposition is the type of encryption that caused when one side of the unshielded twisted pair cable is finished in the configuration of  T568A and at the other side of the configuration of T568B, it is also termed as error or cipher. So, that's why the following answer is true.

7 0
3 years ago
Give the value of the zero flag, the carry flag, the signflag, and the overflow flag after each of the following instructions if
Vanyuwa [196]
The correct answer is A for this question
6 0
2 years ago
(10 LC)
barxatty [35]

Answer:

college A

Explanation:

7 0
2 years ago
Other questions:
  • Describe any four rights of users of information systems.
    8·1 answer
  • Who is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hac
    9·1 answer
  • When a client computer wants to connect to a service instance, what specific name type does it use to find the service?
    9·1 answer
  • Write a function that, given an array A of N integers, of which represents loads caused by successive processes, the function sh
    15·1 answer
  • When a bank account pays compound interest, it pays interest not only on the principal amount that was deposited into the accoun
    10·1 answer
  • What tool should you use to look for information on a network?
    14·2 answers
  • Peripeteia is also referred to as __________.
    5·2 answers
  • Which of the following statements are true concerning abstraction and refinement? Select 3 options:
    14·1 answer
  • Gn guys have an Amazing day!
    12·2 answers
  • One of the most notable impacts of IT on business is improved
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!