1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexandra [31]
3 years ago
15

Why do you need to cite your sources? (check all that apply)

Computers and Technology
1 answer:
Shalnov [3]3 years ago
4 0

the answer to this is  2 and 3

Hope this helped

-scav

You might be interested in
Which loan type requires you to make loan payments while you’re attending school?
mixer [17]
Direct Subsidized Loans<span> are available only to undergraduate students who have financial need. Direct Unsubsidized </span>Loans<span> are available to both undergraduates and graduate or professional degree students. </span>You<span> are not </span>required<span> to show financial need to receive a Direct Unsubsidized </span>Loan<span>.

Hope this answer helps! feel free to ask any additional questions :)</span>
4 0
3 years ago
HELP PLEASE!!!!
denis23 [38]

Answer:

1100 ; 11000 ; 110000 ; 1100000

Explanation:

Converting the following decimals to binary :

2__12

2__6 r 0

2__3 r 0

2__1 r 1

___0 r 1

12 = 1100 base 2

2.)

2__24

2__12 r 0

2__6 r 0

2__3 r 0

2__1 r 1

___0 r 1

24 = 11000 base 2

2__48

2__24 r 0

2__12 r 0

2__6 r 0

2__3 r 0

2__1 r 1

___0 r 1

48 = 110000 base 2

2__96

2__48 r 0

2__24 r 0

2__12 r 0

2__6 r 0

2__3 r 0

2__1 r 1

___0 r 1

96 = 1100000 base 2

5 0
3 years ago
Password procedures, information encryption software, and firewalls are examples of measures taken to address:
Gnoma [55]
<span>Password procedures, information encryption software, and firewalls are examples of measures taken to address are all measures taken to safeguard information security and protect users data from being tampered or manipulated by invaders. 

In web, if we leave our information without encryption or if we leave our system without firewall, different types of security threats might arise: such as, information being hacked, manipulated or sent to wrong places. To avoid this information encryption is done. We might also need to firewall our system so that we can avoid unwanted access and invading of our privacy using malwares and other tools. </span>
5 0
4 years ago
10. Question
Andreas93 [3]
It will go down then it will start working
4 0
4 years ago
Hunter took his sick puppy to Jade to get medication. Jade is
gizmo_the_mogwai [7]
 jade is a veterinarian
8 0
3 years ago
Read 2 more answers
Other questions:
  • To create an effective study schedule, a student must guess the amount of time needed for studying. write down all activities an
    11·2 answers
  • In an image citation, what piece of information is listed first?
    14·1 answer
  • All of the following are guidelines for maintaining an engineering notebook EXCEPT
    7·1 answer
  • Microsoft is interested in customers' perceptions of Windows 8, its new PC operating system. Since the research goal is rather s
    15·1 answer
  • A standard computer monitor is 1024 pixels wide and 768 pixels tall
    9·1 answer
  • A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user
    10·1 answer
  • A(n) _____ describes your core values and highest career goals. A. résumé B. objective statement C. qualifications profile D. pe
    7·2 answers
  • Which of the following is NOT an example of soft skill?
    10·2 answers
  • Unit: Advanced Productivity Applications This activity will help you meet these educational goals: Content Knowledge—You will us
    8·1 answer
  • i installed windows 11 all looks ok except my ebay and some other sites are all white with black text no highlights or color???
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!