1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
4 years ago
11

A ____________ is a set of commands which can be run by calling it by name.

Computers and Technology
2 answers:
mixas84 [53]4 years ago
7 0
The answer to this question is a protocol.
UNO [17]4 years ago
3 0

Answer:

The answer is:

Function

Explanation:

bap

You might be interested in
The weird suspicious box that k12 sends the parents to put on the router. im getting strange privacy error messages on google an
lorasvet [3.4K]

Answer:

34

Explanation:

WHY BECAUSE 34 IS PRIME AND THIS PROBLEM REDUCE THE NUMBER AND CHANGE THE NUMBER INTO A MIXED NUMBER

7 0
3 years ago
Is TCP really more secure than other L4 protocols by default?
yulyashka [42]

Answer:

Yes TCP is

Explanation:

3 0
2 years ago
How does information promote cooperation and Industry please explain​
IRISSAK [1]

Answer:

Provide teams with the resources they need to work together.

Train employees and encourage ongoing learning.

Encourage people to socialize outside of work.

Clarifying roles and setting expectations.

Review individual's talents.

Explanation:

6 0
3 years ago
Maggie is preparing a business report. Which types of keys will she use to type out words and numbers?
nadya68 [22]
She would use enter period comma backspace
Hope this helps u
6 0
3 years ago
Read 2 more answers
Is this photo considered rim photography
xenn [34]

Answer:

No

Explanation:

The photo in the question is just a black and white filter whereas in Rim photo, the image subject is backlit and the image is exposed to hide the subject features in shadow.

An example of Rim photography.

7 0
3 years ago
Other questions:
  • Which of the following is NOT a group on the Slide Master tab?
    6·1 answer
  • Which are malicious codes? <br><br> JavaScript <br> Key loggers <br> Scrum <br> Spyware <br> Worms
    12·1 answer
  • A web client is sending a request for a webpage to a web server. from the perspective of the client, what is the correct order o
    14·1 answer
  • Which sentence uses a pair of synonyms? Because there was so much shouting, many of the protestors began screaming in order to b
    6·2 answers
  • Consider a satellite orbiting the earth. Its position above the earth is specified in polar coordinates. Find a model-view matri
    12·1 answer
  • What's a sentence with the words trickle and resume in it? they can be in any tense. Thanku​
    5·1 answer
  • Which documents might an employer expect to find in a career portfolio?
    15·2 answers
  • The term integration mean?
    7·2 answers
  • Every single device can be connected to every other device on network, making the network mesh. This statement is True or False?
    8·1 answer
  • What makes a recipe for a meal an example of an algorithm?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!