1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svet_ta [14]
3 years ago
5

Help me with this please

Computers and Technology
1 answer:
Ymorist [56]3 years ago
7 0

Answer:

q1 chees

q2 web and digital continant

Explanation:

because haaa haaa haa dhum

You might be interested in
PV = 11,000 AC = 6000 CV = 4,000. What is SV? What does this calculation tell you?
pogonyaev

Answer:

I don't see an SV in the examples.. I suspect these are the name plate numbers off of a transformer... but.. more context would really help

Explanation:

8 0
4 years ago
Computers are often referred to as _____.
GalinKa [24]
Smart machines I'm pretty sure
4 0
3 years ago
What is one advantage and disadvantage of designing a support security that might be based on a centralized model, where all sen
defon

Co-Ordination Difficulty: ...
Waste of Resources: ...
Larger Interests of the Enterprise Neglected: ...
Emergency Decision not Possible: ...
Lack of Qualified Managers: ...
Certain Activities Decentralization not Possible:
8 0
3 years ago
A large number of genetic codes are stored as binary values in a list. Which one of the following conditions must be true in ord
Bad White [126]

Answer:

D

Explanation:

3 0
3 years ago
Read 2 more answers
Computer a sends a packet intended to reach computer f. along its path it arrives at computer
disa [49]
<span>To the computer f, this answer is because when reading the statement I assume that there is no type of connection and / or communication between the computer a and c; therefore to be profitable the computer c should return the package sending it back to computer f.</span>
5 0
3 years ago
Other questions:
  • When purchasing a(n) ________ computer, having cellular as well as wifi can be important?
    9·1 answer
  • It is a function that ends the connection to the database.
    9·2 answers
  • ____ refers to data, applications, and even resources stored on computers accessed over the Internet. Answer
    5·1 answer
  • A typeface in which each character has the same width and is often used to display programming code is _
    8·1 answer
  • . The first step in devising security services and mechanisms is to develop a security policy True False
    11·1 answer
  • How do you do these two questions? The first might have multiple answers and the second will have only one answer.
    14·1 answer
  • Which field of study would be most useful for a person who wants to work in a recycling plant?
    12·2 answers
  • A ________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers con
    9·1 answer
  • Explaio mode of Operation of x-ray​
    15·2 answers
  • Type the correct answer in each box. Spell all words correctly, and use numerals instead of words for numbers. If necessary, use
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!