1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tems11 [23]
3 years ago
8

Refer to the image of the Cornell method, then use the drop-down menus to complete each statement. Number 1 should be . Number 2

should be . Number 3 should be .
Computers and Technology
2 answers:
taurus [48]3 years ago
8 0

Answer:

1=Main Ideas, 2=details, 3=summary

Explanation:

Just took the test on Edg 2021

kifflom [539]3 years ago
6 0

Answer:

e

Explanation:

You might be interested in
To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl
Zolol [24]

Answer: False

Explanation:

 The given statement is false, as the configuration of the firewall, operational and administration procedure must be documented.

The configuration of multiple firewall are identical and the integrity and also performance of the configuration firewall files are check on the regularly bases.

It is basically used to avoid the security leaks and the documentation errors so it is necessary that it should be check regularly so that it can easily implement without any interrupt occurrence.

8 0
3 years ago
Your son is complaining that his smartphone is broken. He tells you that he cannot connect to the internet, nor can he make or r
ycow [4]

Answer:

the correct and only reasonable answer is option B

3 0
2 years ago
Printed versions of your presentation that contain the slides and blank lines below are called speakers notes
Vadim26 [7]

No, printed versions of your presentation that contain the slides and blank lines below are not called speakers notes.

Speakers notes are notes that are hidden within a PowerPoint presentation and allowing the speaker to refer back to them during the presentation.

6 0
4 years ago
Read 2 more answers
Which of the preventive strategies is described below: Violence often escalates. Behaviors like excessive complaing, hostility,
Leviafan [203]
Um, I think the answer to this is probably a mentally ill problem. You should give some options.
7 0
3 years ago
The image uses a school of fish to symbolize leadership.
timurjin [86]
Front is the answer because the fish is in red while the rest are in blue
5 0
4 years ago
Read 2 more answers
Other questions:
  • Write a static method, getBigWords, that gets a single String parameter and returns an array whose elements are the words in the
    15·1 answer
  • How can I collect tweets from different accounts concurrently and categorize the tweets in a corpus?
    15·1 answer
  • In the ADT graph the methid addVertex has efficiency
    15·1 answer
  • WHY IS BRAINLY NOTIFICATIONS LIKE THIS?????
    15·2 answers
  • XML Schemas consist of:
    15·1 answer
  • Discuss the most enormous cases of a data breach in the twenty-first century
    6·1 answer
  • Why is internet download speed slower on a computer vs phone
    9·1 answer
  • What does it mean that the right mouse button is context-sensitive?
    15·1 answer
  • Wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww!
    7·1 answer
  • Evaluating sorts given the following array: 41, 32, 5, 8, 7, 50, 11 show what the array looks like after the first swap of a bub
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!