1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mandarinka [93]
3 years ago
8

Select all that apply.

Computers and Technology
1 answer:
salantis [7]3 years ago
8 0

Answer:

I beleive the anwers are all but A

Explanation:

B, C, D

You might be interested in
Can I get the code for the Edhesive Assignment 3 Chatbox in python? Thanks.
kirza4 [7]
Sure it’s 5VD8H, dishskdnbdbsjakaksmxnxbhsjsnxnxn
7 0
3 years ago
The online underground is used _____. Select 3 options. by law-abiding citizens only on Black Friday for networking by criminal
makvit [3.9K]

Answer:

The online underground is used :- 1] by cybercriminals to purchase malicious software.

2] by cybercriminals to sell ransom services.

3] by criminal organizations.

I hope it's correct.

6 0
3 years ago
Read the following scenario:
DochEvi [55]

Answer:

option d

Explanation:

Hope it helps mark me brainliest :)

3 0
3 years ago
Read 2 more answers
In which area is composing for games similar to composing for
ankoles [38]

Answer:

The correct answer is C)

Explanation:

Movies and Video games make use of soundtracks.

To produce quality soundtracks, they must be created, mixed and edited using sound editing and mixing applications.

Examples of audio softwares are:

  1. Fruityloops
  2. Adobe Audition
  3. Audacity and
  4. TwistedWav

Cheers!

7 0
4 years ago
Which of the following correctly declares and initializes a Scanner object that will use input from the keyboard as its data sou
zepelin [54]
Option 4 is correct.........
5 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is an extension of the fill pattern Sunday,Tuesday?
    10·2 answers
  • The strength of the electromagnetic waves being radiated from an antenna is referred to as gain, which involves a measurement of
    9·1 answer
  • The wires that transfer data across the motherboard are known as the
    9·1 answer
  • ___ apps can allow you to lock your mobile device and sim card remotely.
    15·1 answer
  • Lynn runs the locate command and the results include many files from a directory that she doesn't want to include in her search.
    9·1 answer
  • Without a well-designed, accurate database, executives, managers, and others do not have access to the ____________________ they
    15·1 answer
  • An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks
    6·2 answers
  • Write motivation of cache memory​
    9·1 answer
  • If you were creating a program that would convert Fahrenheit to Celsius, which kind of variable would you want to use? a string
    7·2 answers
  • GIVING 50 POINTS!
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!