1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sattari [20]
3 years ago
6

Which punctuation mark should go in the underlined space to show a break in the speech?

Computers and Technology
2 answers:
Citrus2011 [14]3 years ago
5 0

Answer:

its a

Explanation:

Arisa [49]3 years ago
3 0

Answer:

...

Explanation:

The elipses show a pause while showing that the information is relevant

You might be interested in
Which of the following is the fastest growing input technique​
Natali [406]
We need more information for this one, please.
8 0
3 years ago
Martha is developing a software program in C++ and has a question about how to implement a particular feature. She performs an o
VLD [36.1K]

Answer:

A blog

Explanation:

A blog is a regularly updated website or web page, typically one run by an individual or small group, that is organised by posts.

7 0
3 years ago
To avoid legal issues and set clear guidelines and expectations for employees, employers should put which of the following in pl
Mademuasel [1]

Answer: social media policy

Explanation:

In order to avoid legal issues and also set clear guidelines and expectations for the employees in an organization, it is required that employers should put a social media policy in place.

A social media policy refers to a document which outlines how an organization and the employees will behave and conduct themselves online. This helps to checkmate and curtail the activities of the employees so that there won't be a detrimental effect on the organization.

8 0
3 years ago
Generally considered to be the most important information security policies, what item below defines the actions a user may perf
tamaranim1 [39]

Answer:

A. Acceptable use policies

Explanation:

These specific actions that the user may perform are all described in the acceptable use policy. The company usually requires that the user read and sign this policy before being granted a network ID into the system itself. By signing this agreement the individual user agrees to perform ONLY the actions listed in the agreement and nothing else and are restricted from unauthorized areas.

3 0
3 years ago
Can someone please do this java lab for me (100 point version)? Heres the link: https://www.dropbox.com/sh/a639urhsggss051/AADdn
nlexa [21]

Answer:

não entendi DESCULPA kkkk

8 0
3 years ago
Other questions:
  • Your computer running Windows 7 is doing some very strange things with the operating system. You are fairly certain it is not a
    10·1 answer
  • Presentation software allows business professionals to _____.
    14·2 answers
  • Typically, when an organization purchases Internet access from an Internet Service Provider (ISP), the ISP will grant it
    10·1 answer
  • Can i still download an update for an xbox one game if it's not turned on
    13·1 answer
  • Previous
    11·1 answer
  • Displays information a bout drivers, network connections, and other program-related details.
    6·1 answer
  • :P 80 points to spare so i guess its free!!!!!!
    9·2 answers
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
  • EASY What does the Backspace key do?
    6·1 answer
  • One of the most notable impacts of IT on business is improved
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!