1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
3 years ago
6

The most common clefs for high notes are what?

Computers and Technology
2 answers:
Eddi Din [679]3 years ago
8 0
The answer is C.Treble
Zina [86]3 years ago
3 0
It is soprano they are high notes
You might be interested in
IP ______ occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.
Veseljchak [2.6K]

Answer:

Spoofing

Explanation:

Spoofing that occurs when an intruder computer fools network into believing its IP address is associated with trusted source

5 0
2 years ago
I will mark you as brainlist
weeeeeb [17]

Answer:

download it

Explanation:

because if u upload it will not save .

7 0
2 years ago
Read 2 more answers
Need help with this please and thanks
Kryger [21]

Answer:

<h3>Connector names are written below Picture vise:</h3>
  • USB-C
  • USB 2.0
  • Micro USB
<h3 />

Explanation:

Following is the brie Illustration of the terms used:

  • USB-C:

              It is the newest connector in the market with the             reversible/symmetrical design. It can be adapted to work with the legacy connectors such as USB-A, USB-B, USB-C and Micro USB.

  • USB 2.0:

              It is used mostly in the connections of electronic devices such as printers and smartphones. It has A to B connectors as well as micro USB connectors and mini USB connectors.

  • Micro USB:

              It is used for the connection o compact devices such as smartphone and mp3 players. They are further grouped into three categories: Micro A, Micro B and micro USB 3.

<h3>I hope it will help you!</h3>
7 0
3 years ago
Taylor develops a prototype for a new smartphone. It only includes code, a way to process the input, a memory card, and a microp
marysya [2.9K]

Answer:

i would say C.output

Explanation:

the program would be the code, the input would be the input, and the memory card would be the memory leaving the output as the only thing forgotten.

6 0
3 years ago
Read 2 more answers
You have recently been called to troubleshoot network connectivity problems at a user's workstation. You have found that the net
Verdich [7]

Answer:

The answer is "Pass the cable into the ceiling instead of over the floor".

Explanation:

Network access explains the complex process of link different parts of the network with each other, e.g. while using switches, routers, and access points, and whether, that system works.

  • To replace the cable with a pair cable graded in plenum, covered, twisted.
  • We use the cable to pass through the ceiling rather than through the concrete, eliminating the issue and stopping it from occurring again.
3 0
3 years ago
Other questions:
  • A digital footprint is all of the information on-line about a person posted by that person or others, ____________. intentionall
    14·1 answer
  • ____ are systems in which queues of objects are waiting to be served by various servers
    5·1 answer
  • Which part is the author’s address?
    5·1 answer
  • )What is proceduralabstraction, and why is it important inComputer Science
    14·1 answer
  • JPG is considered a lossy file format. What does this mean?
    15·2 answers
  • Can anybody do Algorithm 2 for me (with Python).<br> Answer = 25 points.
    13·1 answer
  • 3.6 Code Practice on Edhesive
    10·1 answer
  • Quick!! Im taking a timed test so pls hurry!! Ill even mark as brainliets!!
    5·2 answers
  • PLS REPLY ASAP WILL MARK BRAINLIEST
    5·2 answers
  • The term information technology was first used what year?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!