1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katen [24]
2 years ago
14

Jacob is a website designer. Whenever his company takes on a new project, Jacob takes the initiative and comes up with ideas and

solutions. Which skill is Jacob using?
Computers and Technology
1 answer:
Troyanec [42]2 years ago
3 0
Eating a potato is what hes using
You might be interested in
Put these events in the order in which they occurred,
lakkis [162]

Answer:

  1. Local fisherman recover the body of Major Martin off the coast  of Spain .
  2. Spanish officials pass off the information in the briefcase to  German agents.
  3. Major Martin's name appears on a casualty list in a British  newspaper.
  4. Germany prepares for an imminent attack on the island of  Sardinia.

Explanation:

This above is the order in which Operation Mincemeat was executed in WW2 to deceive the Germans into believing that the Allies were going to invade the Balkans directly instead of Sicily which was their actual target.

The plan involved a fictitious Major Martin who had secret documents about the Allied invasion of the Balkans. After the body was released from a British submarine, it washed up in Spain where it was found by local fishermen.

Spanish officials then passed the information in the briefcase Major Martin had to German intelligence. To further reinforce the ruse, the British published Major Martin's name in a casualty list.

The Germans were thoroughly convinced and switched forces from Sicily for the defence of the Balkans and the island of Sicily.

5 0
3 years ago
Which layer of the osi model defines functions related to data delivery, error recovery, and flow control?
Dominik [7]
Answer is the Transport Layer.
5 0
3 years ago
Andrew has data in cell E14 and the cell should be blank. Andrew should _____.
denpristay [2]
Use the mouse to click on cell E14 and press delete
4 0
3 years ago
Read 2 more answers
You want to be super private with your email. You'd like to be able to download your email to a single device, then remove it fr
DENIUS [597]

Since the person want to be super private with your email, the email protocol can you use to do that is POP 3.

<h3>What is  POP3 about ?</h3>

POP3 is known to be a tool that gives one room to be able to download email to a single device, which a person want to use if they want to add privacy to their emails.

Therefore, Since the person want to be super private with your email, the email protocol can you use to do that is POP 3.

Learn more about email from

brainly.com/question/24688558

#SPJ1

8 0
2 years ago
(1)(50%) The program converts a three-ASCII-digit number to an 8-bit unsigned binary. For example, a 3-digit number as ‘0’ (=$30
MatroZZZ [7]

Answer:

Explanation:

3 - digit number                                             8 - bit binary

0 (=$30), 1 (=$31), & 8 (=$38)                          00010010

1 (=$31), 2 (=$32), & 9 (=$39)                          10000001

2 (=$32), 3(=$33), & 0 (=$40)                          11100110

2 (=$32), 4 (=$34), & 1 (=$41)                           11110001

2 (=$32), 5 (=$35), & 2 (=$42)                           11111100

2 (=$32), 5 (=$35), & 3 (=$ 43)                           11111101

2 (=$32), 5 (=$35), & 4 (=$44)                            11111110

2 (=$32), 5 (=$35), & 5 (=$45)                            11111111              

8 0
3 years ago
Other questions:
  • What is the difference between HTML and CSS? * 1. CSS is a markup language unlike HTML 2. HTML is a backend technology and CSS i
    7·1 answer
  • Ted is a fashion designer. Where is he most likely to work
    9·1 answer
  • Create a Python program as described below and save it in a file named bool. You should use IDLE or similar environment to creat
    15·1 answer
  • Mass production usually uses an _______________ ____________ or production line technique.
    7·1 answer
  • 52.
    11·1 answer
  • Trish has bought a new computer that she plans to start working on after a week. Since Trish has not used computers in the past,
    10·1 answer
  • You are attempting to gather information about a client's network, and are surveying a company site. Access is gained via secure
    8·1 answer
  • Another pitfall cited in Section 1.10 is expecting to improve the overall performance of a computer by improving only one aspect
    13·1 answer
  • What goals do you set for yourself while studying?
    9·2 answers
  • when working with smart which tab would provide the ability to change the shape or size of the smart art shapes
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!