1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesnalui [34]
3 years ago
11

Clay wants to print T-shirts and sell them online. What printing press would be the best for him to use?

Computers and Technology
1 answer:
valkas [14]3 years ago
3 0

Answer:

I think is screen printing press.

Explanation:

Screen printing requires you to go through a multi-step, back-breaking process to print your t-shirt.

You might be interested in
HELP FAST
Ghella [55]

Answer:

spelling errors and/or punctuation errors

4 0
3 years ago
The ListIterator interface
Katyanochek1 [597]

Answer:

b. adds to Iterator the ability to move backwards in the collection

Explanation:

In Java programming, the ListIterator interface adds to Iterator the ability to be bidirectional i.e move backwards and forward in the collection and it is a sub-interface of the Iterator interface.

The ListIterator interface makes it possible to modify any list during iteration and determine its position in the list.

4 0
3 years ago
Describe Ms word environment.​
Alexeev081 [22]

On Microsoft Word, you can edit your Word.... You can add pictures, do journals, do menus, and stuff like that... You can add color to text, make lists, add shapes to your Word, etc...

8 0
3 years ago
What three best practices can help defend against social engineering attacks?
lina2011 [118]

The three best practices that can help protect against social engineering are:

  • Be watchful of instructions to click on enticing web links.
  • Educate employees regarding policies.
  • Avoid disclosing your login details.
<h3>Social engineering</h3>

This refers to online crimes that are socially engineered or designed to trick victims into providing certain information or carrying out certain actions that would cause unknown harm to them or others.

For example, they may be tricked into revealing their security information or other personal information via email correspondence.

You can learn more about social engineering here brainly.com/question/26072214

#SPJ12

6 0
2 years ago
Ted has $55.00 in his pocket. Which purchase will he be able to pay for with cash?
Alex73 [517]
You just need a little bit of math to solve this. Add up the items and see which one would be equal to $55.00 or less. 

A = $59.90 so this is not the answer
B = $60.94 so this is not the answer
C = $55.99 so this is not the answer

D = $50.97 

D is the correct answer.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Race conditions are possible in many computer systems. Consider a banking system with two methods: deposit(amount) and withdraw(
    14·1 answer
  • Write a program that asks the user to input four numbers (one at a time). After the four numbers have been supplied, it should t
    6·1 answer
  • An indirect effect of an action, be it a cost or benefit, for a third party who did not agree to the action is known as a(n) ___
    8·1 answer
  • Which of the following is NOT true about RMI? RMI uses the socket connection, including opening and closing the socket. RMI allo
    8·1 answer
  • What does it mean to search an index or the web? (DONT TAKE ANSWERS FROM THE INTERNET!)
    9·2 answers
  • The memory unit of a computer has 2M Words of 32 bits (or 4 bytes) each. The computer has an instruction format with 4 fields: a
    14·1 answer
  • What is the local portion of the e-mail address below? <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="
    15·1 answer
  • Where do i put the lines?
    11·1 answer
  • I have a question about a hotel tv: So I’ve brought my Nintendo Switch and my dock and plugged it in to the tv. Everything seems
    13·1 answer
  • In object-oriented analysis, an object is a member of a(n) _____, which is a collection of similar objects.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!