1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xz_007 [3.2K]
3 years ago
5

They are correct? thank you!

Computers and Technology
1 answer:
vredina [299]3 years ago
8 0

Answer:

<em>Yes</em><em> </em><em>they</em><em> </em><em>are</em><em> </em><em>correct</em><em>.</em><em> </em><em>welcome</em><em>.</em><em>.</em><em>.</em><em>.</em>

You might be interested in
How do you convert a binary number into a decimal number?
S_A_V [24]
<span>by expanding the binary number as the sum of different powers of 2. For example:

0000 0110 #binary ==
1*2^3 + 1*2^2 = 12
</span>
6 0
3 years ago
Who is better, Tom, Ben, Hank, Angela, or Ginger
Maslowich

Answer:

Tom

Explanation:

5 0
2 years ago
Read 2 more answers
Patient letters created from __________ use structured data and do not require a large amount of typing from the medical assista
umka2103 [35]
Templates I think. not sure
3 0
3 years ago
Can someone text me cuss I'm bored my number is (225) 975 7120
slavikrds [6]

Be careful sending numbers online, people could easily dox/track you down just for that. Also I won't text you but I wouldn't mind chatting on here

3 0
4 years ago
Which of the following is a feature of Big Data? Group of answer choices Its datasets are at least a petabyte in size. It is gen
Serggg [28]

Answer:

Its data sets are at least a petabyte in size.

Explanation:

Big data data sets are of huge size to perform the computations using modern techniques.

6 0
4 years ago
Other questions:
  • A spreadsheet program has many subparts. What is the smallest unit in a spreadsheet?
    9·2 answers
  • Which spreadsheet operation does a look function perform?
    5·1 answer
  • Which of the following parts of a tool would require the tool to have a guarding device?
    13·2 answers
  • Discuss whether the redundant data should be addressed prior to beginning the wireless network architecture project, in coordina
    11·1 answer
  • How do assembly language different from machine language?
    15·1 answer
  • What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records
    8·1 answer
  • My uh coding teacher would like the class to do little piggy with code.
    10·1 answer
  • Select the correct answer.
    6·1 answer
  • A developer calls you with a problem. He was trying to debug a new daemon and mistakenly placed it on the production machine ins
    6·1 answer
  • The internet is based on which three key technologies?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!