1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
3 years ago
6

The most common clefs for high notes are what?

Computers and Technology
2 answers:
Eddi Din [679]3 years ago
8 0
The answer is C.Treble
Zina [86]3 years ago
3 0
It is soprano they are high notes
You might be interested in
Java variable is the name of a Group of answer choices numeric data value stored in memory data value stored in memory that can
artcher [175]

Answer:

Java variable is the name of a group of data value stored in memory that can change its value but cannot change its type during the program's execution

Explanation:

Generally, a variable is a temporary location in the memory where data are stored in a computer program. Values in the variable can always be change during the course of program execution.

The equal sign ( = ) is use to assign and identify a variable. The value to be stored in the variable is always at the right of the equal sign, while the variable name is always at the left of the equal sign.

5 0
3 years ago
Give two reasons why network security is the most important issue regarding data centers.
deff fn [24]
Three key concepts of security are integrity, confidentiality, and availability.

Network firewalls are the first line of defense, intended to keep intruders out. Once a system is compromised, all of its data can be accessed, and if a bad actor gains access to one system, they effectively have access to all of the systems. This touches on both system integrity and data confidentiality.

Security is also related to availability, or uptime. If your network is compromised, it may be inaccessible to those who need to use it, making it useless. If I'm working from an office in Chicago, and the company's main DC is in Atlanta, I need the network to remain available to access critical files.
7 0
3 years ago
You have created a slide that is functional, but a bit on the boring side. In five to ten sentences, describe changes you would
Bess [88]
To make my slide more effective, I would add two or three pale colors that would decorate it while not distracting viewers from the topic. I would also add visuals that would engage viewers and give them a better understanding of the material. Additionally, I would include more examples and details to give viewers a clearer picture of what I would be attempting to convey to them. The final thing I would do to the slide would be to organize it in a way that would present information well. In conclusion, in order to improve the effectiveness of a slide, I would make changes to its design and layout that would make it easier for viewers of the slide to understand.
4 0
2 years ago
Im sad cheer me up please
SSSSS [86.1K]

Answer:

Don't worry !! Everything will be fine

Explanation:

5 0
3 years ago
Read 2 more answers
Which option best describes the cheapest way to file your federal income taxes?
Triss [41]
<span>C. Complete it yourself using pencil and paper. For most people it is relatively simple to file taxes, barring any factors like retirement accounts or other income like capital gains. Online software can be useful, too, but often carries unforeseen fees that can be avoided by simply filing the tax paperwork yourself.</span>
3 0
3 years ago
Other questions:
  • Seasons Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month a
    14·1 answer
  • A phone call costs $0.58 plus $0.15 cents per minute. If the total charge for the call was $4.78, how many minutes was the call?
    15·1 answer
  • An example of a historical challenge of STAMIS is
    13·2 answers
  • All of the following are vertical alignment options except __middle , top, center, or_bottom_.
    12·1 answer
  • Addition and subtraction are considered to be ____ operations performed by a computer.
    7·1 answer
  • Can somebody help I need it now please and thank you correct answer please
    10·2 answers
  • A security policy is a?
    11·2 answers
  • Ano ang dalawang paraan sa paggawa ng abono?​
    6·1 answer
  • Before entering an intersection, the safest searching process is to search ________. right, left, right, center left, center, ri
    5·1 answer
  • Which of the following HTML codes is correct for an ordered list?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!