1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
2 years ago
8

Part 3 (The stunner)

Computers and Technology
2 answers:
Drupady [299]2 years ago
7 0

Answer:

nice :)

Explanation:

masya89 [10]2 years ago
5 0

Answer: Once again, levers where we cant see.

You might be interested in
What do people do when they navigate using GPS
Debora [2.8K]

Answer:

they use  it when they are driving and when they dont know where they are doing

Explanation:

7 0
2 years ago
Read 2 more answers
after placing her insertion point after grandma's kitchen, order the steps Danica needs to follow to insert and format the regis
KengaRu [80]

Answer:

step 4

step 5

step 3

step 2

Explanation:

8 0
3 years ago
Read 2 more answers
When you sign in to your Microsoft account with another Windows device, your settings will appear very differently than they do
djyliett [7]

Answer:

True

Explain:

All of the setting are device setting that dont follow your account.

3 0
2 years ago
​some forms use a _____ that contains icons or buttons that represent shortcuts for executing common commands.
Galina-37 [17]

GUI, AKA Graphical User Interface

3 0
2 years ago
When talking about changes related to information​ technology, the text identifies three interrelated changes that are responsib
Travka [436]

Answer:

The Growing use of Big data

Explanation:

In information technology big data is along with mobile digital platforms and cloud computing are responsible for bulk of innovations.

Big data is a large set of data that can be analyzed and used for pattern recognition, and extract information from different collection of data. This analysis or collection of data leads to innovation in the field of information technology.

8 0
3 years ago
Other questions:
  • What is a data mining??
    5·1 answer
  • Word 2013 in order to share a document online you must first
    10·1 answer
  • 3. If the typical balance on Lucy's credit card is $750 and the interest rate (APR) on her credit card is 16%, how much in inter
    11·2 answers
  • Which of the following activities poses the greatest personal cybersecurity risk? A. Making a purchase on an online store that u
    13·1 answer
  • In a Comparative Government course, the first unit focuses on the US Congress and the
    8·1 answer
  • High capacity circuits are limited by the least capable network link, which is typically the user connection. As such, it is imp
    11·1 answer
  • The access code for a? car's security system consists of fivefive digits. the first digit cannot be zerozero and the last digit
    13·1 answer
  • What time is it NOW??
    11·2 answers
  • What is not recyclable in a<br> hybrid car<br> hydrogen car<br> petrol car
    15·1 answer
  • Which of the following offers a combination of the features of ram and rom?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!