1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill [66]
3 years ago
15

What does not stand for​

Computers and Technology
2 answers:
zzz [600]3 years ago
8 0
Not stands for Naczelna Organizacja Techniczna.
Brut [27]3 years ago
8 0
Normal Operating Temperature
You might be interested in
Select the correct answer from each drop-down menu.
Dominik [7]

Answer:

(1) input-output equipment, (2) main memory, (3) control unit, and (4) arithmetic-logic unit.

6 0
3 years ago
According to Manny experts how often show files be backed up
timama [110]
They should be backed up every single day as loss of data could mess up certain machines
5 0
3 years ago
Which task should happen during the planning stage of a project? reflect on the project outcomes prevent set-backs determine the
Ipatiy [6.2K]

Answer:

prevent set-backs

Explanation:

some others can be project initiation, project planning,  project execution, project monitoring and control, and project closure.  Hope it helps you! If it does it would be appreciated to be marked brainliest

6 0
3 years ago
Random stuff and pls don't report this thank you :D
skad [1K]

Answer:

hmmm....nice colors....what is it for?

Explanation:

6 0
3 years ago
Read 2 more answers
Which is an example of a crime that might occur in an e-commerce transaction?
Zolol [24]

Answer:

A costumers credit card information is stolen and used by someone else.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Jennifer has written a short story for children. What should be her last step before she submits the story for publication?
    11·1 answer
  • What new england industry quickly collapsed with the discovery of oil in pennsylvania
    9·2 answers
  • Use semaphore(s) to solve the following problem. There are three processes: P1, P2, and P3. Each process Pi has a segment of cod
    11·1 answer
  • A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
    5·1 answer
  • List three ways of breaking a copyright law with the illegal copy of software.​
    11·1 answer
  • The most serious security threat to Bluetooth-enabled devices is ____, which occurs when a hacker gains access to the device and
    10·1 answer
  • What is 1 TB equal to ?<br> . 1024 kb<br> .1024 gb <br>. 1024 pb <br>. 1024 mb​
    6·2 answers
  • What is a banner grab?
    12·1 answer
  • Answer all of the questions,
    7·1 answer
  • Which technology allows multiple vms to have access to the internet? virtual machine manager hypervisor virtual pbx virtual swit
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!