1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Montano1993 [528]
3 years ago
8

In which of the following scenarios would you choose to embed versus import data?

Computers and Technology
1 answer:
MrRissso [65]3 years ago
6 0

Answer:

B.)You want to maintain connections with external files

Explanation:

You might be interested in
Sarah is starting her job at the local ice cream shop. What can Sarah do to make a good impression on her first day of work?
Whitepunk [10]
A is the correct answer.
8 0
3 years ago
Read 2 more answers
It is the job of the _____ to convert between 8-bit-wide digital data and 1-bit-wide digital data.
suter [353]
Multiplexer. A mux converts mutiple inputs into fewer outputs, for example combined with an address bus. Then the address bus decides which part of the input is linked to the output, so the inputs use the outputs each at a different point in time (=time division multiplexing)
3 0
4 years ago
Acid rain is a major biological concern because it damages both living and nonliving things.
Solnce55 [7]
True is the right one    
6 0
4 years ago
Why is it important to proofread your work even after using the Spelling and Grammar tool?
Reil [10]

Answer:

To catch mistakes the spelling and grammar check will not catch.

Explanation:

Grammar and spelling check is not always perfect!

7 0
3 years ago
An example of phishing is: Select one: a. flooding a web server with thousands of requests for service. b. setting up a fake med
tigry1 [53]

Answer:

Option(b) is the correct answer to the given question.

Explanation:

The main objective of the Phishing to posing as a legitimate entity and trick the individuals to sharing her confidential information like information of banking details such as credit card number  and passwords etc.

Phishing is done with the help of email, telephone or etc. Sometime phishing is done by the web page and stolen the website password. Phishing provides financial loss to the individual as well as the organization.

Except for option(b) all the options are not examples of Phishing that's why they are incorrect Options.

7 0
4 years ago
Read 2 more answers
Other questions:
  • Question 1 : Which statement is true about interlaced images? This task contains the radio buttons and checkboxes for options. T
    8·1 answer
  • Hello... does anyone know why Brainly notifications aren’t working???
    11·2 answers
  • Write the definition of a function named alternator that receives no parameters and returns true the first time it is invoked, r
    12·1 answer
  • Please help me ! All you do is just put it it all in your own words ! Please this is for my reported card!i don't know how to pu
    15·1 answer
  • Kayle is building a web form. He has included space where users can input their phone numbers and email addresses. However, he w
    15·1 answer
  • When an argument is passed to a method:A) its value is copied into the method's parameter variableB) its value may be changed wi
    5·1 answer
  • I need help ASAP Asap asap!!!
    11·1 answer
  • "It's inventiveness ,uncertainty and futuristic ideas,typically deals with science and technology,,what is it called??
    12·1 answer
  • Which is the correct process for selecting consecutive rows in a worksheet?
    9·1 answer
  • A user can add color to a database to highlight a modification. To do this with a macro, which command screen would you access o
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!