1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melomori [17]
2 years ago
15

Hellpppp please I need it!

Computers and Technology
1 answer:
Anna [14]2 years ago
8 0

Answer:

1 you can transfer photos or files from one device to another

2 you can store photos or files so you save space on a device

3 not sure lol

Explanation:

You might be interested in
Which situation is an example of? "relational context" in the transactional model of? communication?
Jlenok [28]
An example I believe of relational context is when I was out with my son on the weekend (he has a developmental disability) and we had agree I would buy him a 1/2 sub sandwich the day before but then he said I would like a McFlurry so I said okay and then he said so you mean I can have a McFlurry and a sub and I thought oh oh I stuck my foot in it so I said but it must be only a 1/2 sub so he said no I want a full sub then and no mcflurry so I agreed so from the original 1/2 sub idea the idea evolved to a full sub which was affected by the warm sunny summery weather in the afternoon and seeing people lined up at ice cream shops so the idea developed in relation to the weather, how hungry he was and the social aspect people buying ice cream.
8 0
3 years ago
Which fact does lean green eco machines present to show that electric cars are not perfect
Yuri [45]

Answer: HOPE THIS HELPED YOU! :D ;)

Eco cars are still too expensive for most car buyers

Explanation:

5 0
3 years ago
Read 2 more answers
Unlike memory, this type of storage holds data and programs even after electrical power to the computer system has been turned o
Scrat [10]

Answer:

Secondary memory.

Explanation:

Unlike main memory which loses its content when electrical power to the system is turned off, secondary memory is volatile and persistent in nature. i.e it retains its content whether or not power is supplied to the computer that is holding it. As a matter of fact, they (secondary memory) are meant to store data permanently. Examples of such memory are the hard drives, floppy disks, flash drives, CDs and CDROMs.

Also, unlike the primary or main memory that can be accessed directly by the processor of the computer housing it, secondary memory are not accessed directly.

8 0
3 years ago
What is true about the dilation?
madreJ [45]

Hey hey hey! I recently took the test and the answer is D | (• ◡•)|

7 0
3 years ago
Read 2 more answers
Sam wants to move from his current role in his organization to a managerial role. Which certification will help him get on a man
jolli1 [7]

CCIE refers to Cisco Certified Internetwork Expert, a technical certification that demonstrates high proficiency of managing and establishing computer networks.

CSPM may refer to Certified Security Project Manager, which is a certification to demonstrate the individual’s capability in managing project in the field of cybersecurity.

MCITP refers to Microsoft Certified IT Professional, which demonstrates an individual’s ability to be a database or enterprise messaging administrator.

Oracle DBA refers to Oracle Database Administrator, and this certification demonstrates an individual’s ability to manage Oracle’s database from retrieving, maintaining, and editing them.

While PMP refers to Project Management Professional certification, one that you can use to prove your abilities as a project manager in various business contexts.  

Thus, the best certification for him to use to get to a managerial career path is PMP.

4 0
3 years ago
Other questions:
  • 10 facts about turbines
    11·2 answers
  • Your laptop doesn't have a serial port. what type of connector will your laptop require
    6·1 answer
  • The _______ of a secondary storage device indicates how much data the storage medium can hold.
    13·1 answer
  • is used to reduce the chance of an individual violating information security and breaching the confidentiality, integrity, or av
    6·1 answer
  • As a general rule, what is the size of a brochure?
    11·1 answer
  • Write a program that will sort an array of data using the following guidelines - DO NOT USE VECTORS, COLLECTIONS, SETS or any ot
    10·1 answer
  • Website designers work on the code and programming of a website, not the style or layout of the site.
    9·1 answer
  • Ethan wants to change the font in his document. He should _____.
    8·1 answer
  • Can someone take away your points
    15·1 answer
  • What is used for risk response control?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!