1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Softa [21]
3 years ago
11

Emily wishes to work in print media. What career would she choose for this purpose?

Computers and Technology
2 answers:
lord [1]3 years ago
3 0
Architect (A) is the answer
Naily [24]3 years ago
3 0
The answer is A (it said my answer wasn’t long enough )
You might be interested in
Explain briefly why one should be very cautious when using a Wi-Fi hotspot.
soldi70 [24.7K]

Answer: Other people can access the same network and may have access to parts of your computer to try and steel your data.

Explanation:

6 0
3 years ago
Read 2 more answers
Discuss five domains of Instructional technology​
Effectus [21]

Answer:

Design, Development, Utilization, Management, and Evaluation.

7 0
3 years ago
Question of computer sciences​
BARSIC [14]

Answer:

a ans is cyber crime

b ans is hacking

c ans is cracker

d ans is computer ethics

e ans is phishing

4 0
3 years ago
The function below takes one parameter: a list of strings (string_list). Complete the function to return a new list containing o
Radda [10]

Answer:

def short_strings(string_list):

   short_list = []

   for s in string_list:

       if len(s) < 20:

           short_list.append(s)

   return short_list

Explanation:

* The code is in Python.

- Create a function called short_strings that takes one parameter, string_list

- Create an empty list called short_list to hold the strings that are less than 20 characters

- Initialize a for loop that iterates through the string_list. Check if there are strings that are less 20 characters in the string_list. If found, put them in the short_list

- Return the short_list

4 0
4 years ago
1.
Brums [2.3K]

Answer:

as

is so good

Explanation:

7 0
3 years ago
Other questions:
  • Jessica has pinned her favorite applications as icons on her desktop. She always clicks on these icons to work on them. Which us
    5·1 answer
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    12·1 answer
  • A phone call costs $0.58 plus $0.15 cents per minute. If the total charge for the call was $4.78, how many minutes was the call?
    15·1 answer
  • Write a C++ function, lastLargestIndex that takes as parameters an int array and its size and returns the index of the last occu
    10·1 answer
  • Somebody who is good at this stuff, please halp meh ;-;
    6·1 answer
  • What part of the System Model is a Flow Chart primarily developed for?
    9·1 answer
  • _____ should be scanned for viruses
    13·2 answers
  • People without digital literacy skills are often the victims of
    12·1 answer
  • A(n) ____ is a list of authorization rights attached to an object - in other words, who can access that device or application an
    13·1 answer
  • Write a program in c# that simulates the roll of two six sided dice.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!