1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
3 years ago
12

Plzzzzz help me with this and be serious dont comment random things

Computers and Technology
1 answer:
RoseWind [281]3 years ago
7 0

Answer:

legal and ethical questions

brick and mortar guidelines

website content

customer information

the facts of life

payment processing

human resources

this is in career explorations 2 please help will mark the brainiest ​

Explanation: yes he is right this is correct

You might be interested in
How to get an object from a container in java.
Vinil7 [7]
If it stores any type of objects mixed, use Object as storage class. All classes inherit from Object and for primitives use their respective wrapper classes. Or just use one of the bazillion container classes that already exist.
3 0
3 years ago
Darren wants to substitute every occurence of the word bulky in his spreadsheet with the word strong. which of these options sho
Kaylis [27]
If you wanted to remove all the occurrences of bulky and replace them with the word strong. You would use replace all.
6 0
3 years ago
The Windows ____ window allows you to create the graphical user interface for your application.
DerKrebs [107]

The Windows GUI window allows you to create the graphical user interface for your application.

8 0
3 years ago
C. An error that due to wrong input.​
ladessa [460]

c. An error that due to wrong input.

=> Bug

<em>Hope </em><em>it</em><em> is</em><em> helpful</em><em> to</em><em> you</em>

6 0
3 years ago
Define the following:-<br><br>1) cryptography<br><br>2) Quantum Cryptography​
Readme [11.4K]
1.) the art of writing or solving codes.
2.) the science of exploiting quantum mechanical properties to perform cryptographic tasks.

hope this helps :)
8 0
3 years ago
Read 2 more answers
Other questions:
  • Computer ________ involves identifying, extracting, preserving, and documenting computer evidence. a. inoculation b. forensics c
    8·1 answer
  • Write a c++ application that computes gross salary for Mr.A,given that during the interview session and before started work, it
    5·1 answer
  • What are layers? Why would a layer be used?
    9·1 answer
  • Disk drives have been getting larger. Their capacity is now often given in terabytes (TB) where 1 TBequals1000 gigabytes, or abo
    14·1 answer
  • Describe the steps to play a presentation the way your audience will see it.
    8·2 answers
  • The getting started screen in Microsoft publisher consists of which main parts?​
    7·1 answer
  • To specify AutoCorrect rules and exceptions to the rules, click File to open the Backstage view, click ____ , and then click Pro
    6·1 answer
  • Which action is applicable only to tables?
    13·1 answer
  • The following are three possible logon scenarios. Explain why option (c) below is preferable in terms of system security. a. Wel
    12·1 answer
  • What is the relationship between hardware and software technology tools?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!