1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa [10]
3 years ago
7

Help

Computers and Technology
1 answer:
maria [59]3 years ago
5 0
JohSmit would be the answer because it has first 3-4 letters with correct caps and all
You might be interested in
What's a False statement about online time? A. Blue light from devices can make it hard to sleep. B. It's a good way to connect
mylen [45]

Answer:C

Explanation: This has no basis while the others have studied behind them.

4 0
4 years ago
Which term describes computers (e.g., Windows PC, Mac OS X) with applications that allow a person to perform diverse tasks, from
Oksanka [162]

Answer:

D. Application computers

Explanation:

Application are a set of software programs that run on your computer. These programs are designed to perform specific tasks. These task can range from writing a book on CompTIA A+ certification to talking with someone, with full audio and video.

3 0
4 years ago
What is the digital divide? What does the digital divide mean for the world?
Luda [366]

it mean for some people that have technology like a computer and there are some who don't have access to technology like phones, and tv's

8 0
3 years ago
Classify the characteristics as abstract classes or interfaces.
Sergeu [11.5K]
E for eeeedeerreeeee
4 0
3 years ago
When a program lets the user know that an invalid menu choice has been made, this is an example of?
kolezko [41]

The question has the multiple choices below

A) Input validation
B) output correction
C) compiler criticism
D) output validation

The answer is (A) Input validation

Also known as data validation, it is the correct and proper testing of any input supplied by an application or a user. It prevents wrongly formed data from entering the system. Applications should be able to check and validate every input entered into the system since it is hard to detect a malicious user trying to gain entry into software.










5 0
3 years ago
Other questions:
  • The number of output for a decoder if the input is 4
    14·1 answer
  • The DNS server at your headquarters holds a standard primary zone for the abc domain. A branch office connected by a slow WAN li
    14·1 answer
  • When looking to attract a local audience, why it is important to optimise your website and content for mobile users?
    12·1 answer
  • Write the definition of a function half which recieves a variable containing an integer as a parameter, and returns another vari
    15·1 answer
  • This project involves writing a program that encodes and decodes messages. The program should prompt the user to select whether
    15·1 answer
  • Which game would be classified as an advergame? A. Tomb Raider B. Fifa Soccer C. Prince of Persia D. Flower
    9·1 answer
  • E-mail messages, instant messages (IMs), or text messages sent and/or received within an organization a. are not included on a r
    9·1 answer
  • Which of the following is not a valid C language<br>int​
    6·1 answer
  • The most common threats to your computer and your online safety come from what is called ____
    11·2 answers
  • There are three groups of people, people who like Apples, Bananas, and Cherries. 19 people like Apples. 23 people like Bananas.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!