1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkasestr [34]
2 years ago
12

⣠⣤⣤⣤⣤⣤⣶⣦⣤⣄⡀⠀⠀⠀⠀⠀⠀⠀⠀

Computers and Technology
2 answers:
Brums [2.3K]2 years ago
8 0

Answer:red because he always sus

Explanation:

sus

mestny [16]2 years ago
4 0

Answer:

LOL sweet

Explanation:

You might be interested in
How do most business applications and websites process credit card transactions?
klasskru [66]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Most business applications and websites use and process the credit card for their transaction.

For example, e-commerce website such as ali baba, am a zon, accepting credit card transaction when the customer gets to purchase any product from their stores. Their transactions are processed by in house credit card apps/service. But these apps/services owned by a third party. They just give you API services and related code to integrate the credit card services.  

By using their in-house credit card apps/services, they know that user has transferred the money into their account for the purchased product, upon receiving payment confirmation, they then prepare and dispatch the order.

So, the correct answer to this question is:

To process the credit card transactions, they license third-party credit card apps/services backed by the internet merchant who is responsible for handling and managing the money of the business account.    

6 0
2 years ago
An organization is implementing a preselected baseline of security controls, but finds not all of the controls apply. What shoul
WINSTONCH [101]

The answer is Tailoring the baseline to their needs.

After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.

8 0
3 years ago
Which type of chart is preferable when you are dealing with a timeframe?
ANTONII [103]

Answer:

Pie chart

Explanation:

Just get to know

7 0
2 years ago
Which type of navigation involves multiple frames that are linked to a number of other frames?
sesenic [268]

Answer:

1. b)

2. c)

3. c)

4. a)

5. b)

Explanation:

1. and 5. Linear kind of navigation is a system with a sequential manner web pages that are perfect for some sorts of sites that are having information that has to be viewed as a book (5) and when we are talking about that view we are considering one page after another page like we are reading a book. It is also the simplest navigation. This is the explanation for question 1 and question 5.

2. The most well-designed navigation system is an intuitive one because in this design of the website we have website traffic that is easy because it flows from one web page to another web page. It is showing us where to go to find and look for something and even where to go if there is no concrete options for what are we looking for.

3. A Sitemap is referring to the organized hierarchy of links and it is the protocol that is allowing us to search through many links. A Sitemap is having a listing of the URLs for some site and that is why this is the correct answer.

4. In using liner reciprocal navigation the interface should include how frames are left and how many of them are there. The more the frames, the more times the user will spend on them and the site.

8 0
2 years ago
Write a BASIC program to find the product of any two numbers​
GuDViN [60]

Answer:

Print 4 + 4

Explanation:

If you're writing this in the programming language called BASIC, this is how you would add any two numbers.

6 0
2 years ago
Other questions:
  • A computer application such as Microsoft Access that is used to store data and convert it into information is a ________________
    6·1 answer
  • Which windows tools would you use to browse the files system on a hard drive?
    6·2 answers
  • A page with no meaningful content that is full of ads and the webmaster makes money from if someone clicks on them is called____
    7·1 answer
  • In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number ca
    13·1 answer
  • Ancestor(X,father(X)) and ancestor(david,george) is they unify or not
    11·1 answer
  • 0.005098 megaliters to liters. record your answer in whole liters
    7·1 answer
  • What is work flexibility?
    15·1 answer
  • What are the three basic classes of application
    14·2 answers
  • 12.
    10·1 answer
  • ___ is a career discipline focusing on helping companies use computer technology effectively.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!