1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VladimirAG [237]
3 years ago
13

1.

Computers and Technology
1 answer:
Vlad1618 [11]3 years ago
7 0
A. Since it tells about how people think she’s lesser because she’s a women.
You might be interested in
Which technology can be implemented as part of an authentication system to verify the identification of employees?
STALIN [3.7K]
The answer is smart card readers. Smart card readers can be implemented as part of an authentication system to verify the identification of employees.
5 0
2 years ago
Della is a special education teacher. In her classroom, students may use many different types of utility programs to make it eas
Assoli18 [71]

Answer:

accessibility

Explanation:

Della is a special education teacher. In her classroom, students may use many different types of utility programs to make it easier for them to use their computers. This category of utility software is known as accessibility.

6 0
3 years ago
Read 2 more answers
Whichmultiplexing technique involves signals composed of lightbeams?
Angelina_Jolie [31]

Answer:

3.WDM

Explanation:

WDM ( wavelength division multiplexing ) involves signals composed of light beams WDM is used in communication where fibers are used it is used for multiplexing of number of carrier signals  which are made of optical fibers by using different wavelength of laser light it has different wavelength so this WDM is used for signals composed of light beams it has property of multiplexing of signal

8 0
3 years ago
Justify the first two paragraphs and the tips list.
Ket [755]

Answer:

dont mind me just hwere is your question i literaly can see it anywhere

Explanation:

4 0
3 years ago
Using emails for time-sensitive messages is an example of:
blagie [28]

Answer:time-sensitive email

5 0
3 years ago
Other questions:
  • Select all of the uses of presentation software in the workplace.
    8·1 answer
  • A firewall, when properly implemented, can prevent most attacks on your system.
    11·1 answer
  • The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
    7·1 answer
  • Help me pleseeeeee i will mark u as brainliest
    10·1 answer
  • Describe the dynamic Network Address Translation (NAT).
    9·1 answer
  • PLEASE HELP ASAP!!
    11·2 answers
  • Beth would like to run an nmap scan against all of the systems on her organization's private network. These include systems in t
    15·1 answer
  • Rachel typed two paragraphs and then realized she was in the wrong document. What steps should Rachel follow to quickly move the
    15·2 answers
  • Write the line of Python code that calculates and prints the answer to the following arithmetic expressions.
    7·1 answer
  • How bridges are built over water
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!