1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorC [24]
3 years ago
9

Identify the following​

Computers and Technology
1 answer:
babunello [35]3 years ago
6 0

Answer:

attachment sign

Explanation:

that is the attachment sign.

You might be interested in
[80 points] Fill in the missing word.
AVprozaik [17]

Answer:

except

you can use github copilot for this  question

8 0
2 years ago
Can Anyone Send Me The Correct Code To This ?<br><br> ITS JAVA
scoundrel [369]

Answer:

whta u mean by code?

Explanation:

8 0
3 years ago
I am a non-volatile type of built-in memory. I store my contents long-term. My job is to store critical programs that the comput
AlexFokin [52]

Answer:

read only memory (ROM)

Explanation:

Examples of non-volatile memory include read-only memory (see ROM), flash memory, most types of magnetic computer storage devices (e.g. hard disks, floppy discs and magnetic tape), optical discs, and early computer storage methods such as paper tape and punched cards.

7 0
3 years ago
Hello my friends i am trying to reboot my i phone 4 but i could not i tried many ways can u help me
g100num [7]

Answer:

Launch iCloud.com in the web browser on your PC.

After the page opens, enter the credentials; username and password.

On the screen, after you login, you’ll see all iDevices you’ve associated...

Choose "Erase operation" for devices you can’t log inside.

or

Connect your iPhone to a computer. If your iPhone gets hung up on the Apple logo or a solid-color screen when forcing it to restart, you can try using your PC or Mac to repair it without losing data. Start by connecting the iPhone to the computer using its charging cable.

2

Open Finder (Mac) or iTunes (PC). If you're using Mac Catalina or later, click the two-toned face on the Dock to launch Finder. If you have Windows or an earlier version of macOS, open iTunes from the Start menu or Applications folder. Locate your iPhone. If you're using Finder, click your iPhone's name in the left panel under "Locations." If you're using iTunes, click the button with an iPhone icon near the top-left corner of the app (to the right of the drop-down menu)

Explanation:

8 0
3 years ago
What is the most consistent item regardless of the software used in BI?
vodomira [7]

Answer Explanation:

Business intelligence is defined as the strategies and technologies used by companies for the data analysis of business information it tell us also about predictive views of business operation.

THE MOST CONSISTENT ITEMS REGARDLESS OF SOFTWARE USED IN BI ARE :

  • data analyst has the most responsibility of BI he is the most important part of BI
  • It is the interconnected process of inspection changing and modeling
  • data analysis is hugely aided by data mining
5 0
3 years ago
Other questions:
  •    In the Start menu of Windows 7, you see your name listed as an option. Where does this shortcut lead if you select it?
    8·1 answer
  • Dillion’s company has decided it wants to find a way to do a better job of tracking clothing inventories. Dillon has been asked
    5·1 answer
  • The scope of a variable declared inside of a function is:
    8·1 answer
  • Give a detailed easy to understand explanation what the kerneltrapmode is. WILL AWARD BRAINLIEST!
    13·1 answer
  • Write a function named "list_concat" that takes a list of strings as a parameter and returns the concatenation of all the values
    13·1 answer
  • Which is the fastest CPU and why?
    5·1 answer
  • How many sets of number do both Hex and RGB values have?
    10·1 answer
  • True or False: Variablename must start with a number.
    13·1 answer
  • True or false<br>Y axis is also known as the value X.​
    9·2 answers
  • a network administrator for a large oil company has discovered that a host on the company network has been compromised by an att
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!