1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fofino [41]
3 years ago
12

Which is an example,of an input devices? Choose the answer.

Computers and Technology
1 answer:
Alenkasestr [34]3 years ago
3 0

Answer:

microphone

Explanation:

You have to plug in microphones, and if you plug it in, it is considered an input.

You might be interested in
A lead views a specific page on your website, say, your case study page. You then send targeted follow-up content like one of yo
IRINA_888 [86]

Answer:

Behavioral Email                                

Explanation:

A behavioral email is an automated email which is sent to recipients on the basis of their behavior. These emails are sent after a user communicates with a business on social media, the company’s website, email, and other communication medium. Behavioral emails help to grow customer involvement and sales. Behavioral email can also be used as a marketing strategy, used by marketers to gather data about an email subscriber in order to send targeted content to that subscriber on the basis of his behavior or actions. When the marketer sends an email to the customer, it is appropriate for that customer, based on the data gathered and their current monitored behavior. Behavioral email helps to understand costumer needs. It helps to get an idea of a customers preferences by inspecting his behavior.

5 0
3 years ago
Select the correct answer
Vaselesa [24]

Answer:

professional integrity

Explanation:

The work he is doing is comes under the violation of professional integrity. Because professional integrity is the set of ethics that should be followed by the employ. These ethics includes honesty, loyalty and dependability.

5 0
4 years ago
If a salesperson were trying to sell this cabin, which word would be best to use to make its size seem most positive?
TiliK225 [7]
cozy because it gives it more of a positive connotation
7 0
3 years ago
Read 2 more answers
Letters, memos, and computer printouts of numerical information are examples of formal reports.Group startsTrue or False
kati45 [8]

Letters, memos, and computer printouts of numerical information are examples of formal reports is a  false statement.

<h3>What are  formal reports?</h3>

Formal reports are known to be a type of report that has elements such as a title page, a transmittal, a table of contents, etc. An example are:

  • Inspection Report.
  • Safety and Health Report.

Conclusively, Letters, memos, and computer printouts of numerical information are examples of formal reports is a  false statement because  they are all examples of informal reports.

Learn more about formal reports from

brainly.com/question/11599232

6 0
3 years ago
Solution is c language please help me.​
nordsb [41]

Explanation:

in c++

#include<iostream.h>

#using namespace std;

main()

{ float x,y,z,r, phi, theta;

cout<<" enter the value of x";

cin>>x;

cout<<" enter the value of y";

cin>>y;

cout<<" enter the value of z";

cin>>z;

r = (sqrt(pow(x,2) + pow(y, 2) + pow(z, 2)));

phi = (asinf(y/r)*180.0f)/PI;

theta = (asinf(-x/(r*cosf(phi)))*180.0f)/PI;

cout<<"The radius r= "<<r;

cout<<"The phi angle= "<<phi;

cout<<"The theta angle= "<<theta;

return 0;

}

4 0
3 years ago
Other questions:
  • Variable names may contain spaces and punctuation symbols. True False
    15·1 answer
  • What is the advantage of using a high-level language over machine language for writing computer programs?
    12·2 answers
  • If a secret key is to be used as a _________ for conventional encryption a single number must be generated.
    13·1 answer
  • Type of media that uses laser technology to store data and programs is
    6·1 answer
  • Damian uses a modem to connect to a dial-up network. Which statements are true of a modem?
    11·2 answers
  • In checking the digital signature, the verifier ____. a. decrypts the digital signature it received with the supplicant public k
    13·1 answer
  • The Mohs scale is used to express which mineral property?
    15·1 answer
  • The term "exception propagation" means:
    5·1 answer
  • What are some of the functions in the Consolidate dialog box? Check all that apply.
    6·1 answer
  • Which wireless specification can connect to a school's WLAN and connect to multimedia display projectors wirelessly?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!