1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ki77a [65]
3 years ago
6

The

Computers and Technology
1 answer:
pishuonlain [190]3 years ago
8 0

Answer:

print preview

Explanation: platooo

You might be interested in
If you need to add more data between column C and column D, you should _____.
lina2011 [118]
Right click on the line separating the two columns, and you should be able to select "add column"
4 0
4 years ago
Asking yourself questions can help you think of what to _____, in order to get answers.
Olenka [21]
Ask your self questions can help you think of what to measure, in order to get answers.
8 0
4 years ago
What is data called that is input into a cryptographic algorithm for the purpose of producing encrypted data?
labwork [276]
<span>A key is data called that is input into a cryptographic algorithm for the purpose of producing encrypted data. There are two types of cryptography, the public key and the private key. The public key uses public keys to encrypt data and private key uses private key to decrypt data. They are produced by a group of algorithms. </span>
8 0
4 years ago
APCPS B U10L12 exam (Connexus)
il63 [147K]

I don't know how to that i don't even know how to do my work

7 0
2 years ago
Mrs. Patel uses a computer program to balance her checkbook. Which of the following best explains how the
Alexandra [31]

Answer:

c it reduces errors

Explanation:

Instead of Mrs.Patel doing it she has an online program made for checks to do it for her.

6 0
3 years ago
Other questions:
  • I damaged a k12 laptop. do I have to pay for the damage? and if so how much?
    5·1 answer
  • Function templates ___________.
    5·1 answer
  • How do you make your graphics ADA accessible in BlueGriffon?
    12·2 answers
  • Consider the following two code segments. In both, assume that n is an integer variable that has been declared and initialized.
    10·1 answer
  • Case Study
    15·1 answer
  • What is the alogarithm for solving the perimeter of a triangle
    11·1 answer
  • Write a Java program that prompts for integers and displays them in binary. Sample output: Do you want to start(Y/N): y Enter an
    7·1 answer
  • Raw materials have two basic types what are the 2?
    11·2 answers
  • Why header files are needed in every c program ?expalin​
    14·1 answer
  • The ________ encloses and protects the power supply, motherboard, processor, and memory of a computer. drive bay solid-state sto
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!