1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nitella [24]
3 years ago
7

How to post a answer

Computers and Technology
1 answer:
SSSSS [86.1K]3 years ago
6 0
………………….yes yes yes
You might be interested in
What is the scope of each variable?
kari74 [83]

Answer:

scope of pet name is limited to pet class and color is accessible to the whole program

Explanation:

4 0
3 years ago
Read 2 more answers
Need help on this it’s the last one I need
BaLLatris [955]
Design a ringtone like it says
8 0
3 years ago
Programs that do the same thing every time they run are called...
Misha Larkins [42]

Answer:

predictable

Explanation:

because it repeat itself all time

6 0
2 years ago
Which of the following is a way the operating system prevents unknown or unauthorized users from accessing the system?
Xelga [282]

Put a code or security system on or a very secure password

Hope this helps...

6 0
3 years ago
Read 2 more answers
When a customer places an order atBookBox.com, the company processesthe customer's payment information,sends the order to the ne
mash [69]

Answer:

fulfillment management process

Explanation:

According to my research on the different business process', I can say that based on the information provided within the question this is best described as the fulfillment management process. Which is the process that a company goes through from accepting an order to delivering that order to the client. Which is what is happening in this situation.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Other questions:
  • Which of the following are peripheral devices?
    7·2 answers
  • What additive keeps engines clean by preventing contaminates and deposits from collecting on surfaces? a. Friction modifiers b.
    10·2 answers
  • A token is combination of hardware and software that acts as a gatekeeper and prevents unauthorized users from accessing private
    11·1 answer
  • What do character formats do for your document's message??
    14·2 answers
  • Select the characteristics that describe the evolution of computers that predate the personal computer (select all correct answe
    12·1 answer
  • What is Human Dignity
    12·1 answer
  • ________type of website is an interactive website kept constantly updated and relevant to the needs of its customers using a dat
    5·1 answer
  • If your internet were to go out, what steps would you take to troubleshoot to restore your service?
    15·1 answer
  • Help me pls!!! last question
    9·1 answer
  • In dynamic programming, the technique of storing the previously calculated values is called A. Saving value property B. Storing
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!