1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andru [333]
2 years ago
8

Which of the following is NOT an example of written communication?

Computers and Technology
1 answer:
Veronika [31]2 years ago
4 0

Answer:A conversation between co-workers

Explanation:

You might be interested in
One easy way to tell if a cell contains a formula instead of data is to click on the cell and look at the formula bar to
joja [24]

Answer:

E

Explanation:

i know

3 0
2 years ago
Read 2 more answers
When powering up the computer, the initial program loading and start-up is performed by using a ______________ program that is b
vitfil [10]

Answer:

The answer is Bootsrap

Explanation:

A bootstrap program which is also referred to as a bootstrap loader is a program that resides in the computer’s Read Only Memory. It starts the whole chain reaction and ends up with the entire OS being loaded. This program reads the computer’s hard drive boot sector and continues with the process of loading the Operating System. It first performs a POST test and then proceeds to load the OS intothe main memory.

4 0
3 years ago
An excel worksheet can have a maximum of ____ columns in a worksheet.
Marina CMI [18]

It can have only 16,384 number of columns

6 0
3 years ago
Information that indicates ground air or navy force levels or dispositions is what security?
AlexFokin [52]

Information that indicates ground air or navy force levels or dispositions is <u>confidential</u> security.

Security for a country's higher organizations is essential for a nation's protection.

Serious information like the nuclear organizations, army, navy, and ground air is at a higher risk for threats and hence requires higher security.

The information in such higher organizations is kept confidential and no third person is allowed access to the code of conduct of such organizations.

If information is leaked from the ground air or from navy force levels then there can be serious consequences for it. Hence, such information is always kept under confidential security.

To learn more about security, click here:

brainly.com/question/25375059

#SPJ4

8 0
1 year ago
Question # 6
nika2105 [10]

Answer:

14.0

Explanation:

The loop converts each answer to a float. The accumulator variable adds the values entered.  

2.0 + 5.0 + 1.0 + 6.0 = 14.0

3 0
3 years ago
Read 2 more answers
Other questions:
  • ______ is a certification program that recognizes sustainable building practices and strategies. Question 1 options: A) Brundtla
    10·1 answer
  • What protocol suite below is the most commonly used protocol for local area network (lan) communication?
    8·1 answer
  • ______was developed as an interim management protocol with OSI as the ultimate network management protocol.
    5·1 answer
  • Where can you place CSS statements in an HTML file?
    7·1 answer
  • Write two cin statements to get input values into birthMonth and birthYear. Then write a statement to output the month, a dash,
    7·1 answer
  • Why is printer an output device​
    14·2 answers
  • Which of the following is not a responsibility of an operating system?
    9·2 answers
  • Which step in the software development life cycle analyzes the scope of work?
    6·1 answer
  • How to determine the critical crack size for a<br> plate
    15·1 answer
  • ______________ are used to store information that will be referenced and manipulated in a computer program. They label data with
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!