1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill115 [55]
3 years ago
12

Task 2: Typing a School Speech

Computers and Technology
1 answer:
strojnjashka [21]3 years ago
7 0

This is my school put you can change it up:

It has elementary and high school divisions. Wister Elementary School is a public school located in Wister, OK. It has 333 students in grades PK, K-8 with a student-teacher ratio of 14 to 1. According to state test scores, 14% of students are at least proficient in math and 23% in reading.

You might be interested in
The three Fs of product design are form, fit and
Rudiy27

Answer: Function

Explanation: <em>"Function is a criterion that is met when the part performs its stated purpose effectively and reliably. In an electronics product, for example, function can depend on the solid-state components used, the software or firmware, and quite often on the features of the electronics enclosure selected. Poorly placed or sized ports and misleading or missing labeling are two of the most common ways in which an enclosure can fail the function criterion."</em>

5 0
3 years ago
Read 2 more answers
How to do 2. Pleaser
V125BC [204]

Answer:

GOD HAS FORSAKEN YOU NOW PRAISE DHAR MANN

6 0
3 years ago
Name three output devices
san4es73 [151]

Monitor

Printers

Plotters.

8 0
3 years ago
Assume your organization has 200 computers. You could configure a tool to run every Saturday night. It would query each of the s
lukranit [14]

The tool that would provide a report listing all systems that are out of compliance, including specific issues is Security Compliance Manager.

<h3>What are compliance tools?</h3>

The Security Compliance Manager is known to be a form of downloadable tool that one can use as it helps a person to plan, ascribe, operate, and manage a person's security baselines for Windows client and other forms of server operating systems.

Note that in the case above, The tool that would provide a report listing all systems that are out of compliance, including specific issues is Security Compliance Manager.

Learn more about Security Compliance Manager from

brainly.com/question/24338783

#SPJ1

4 0
2 years ago
(p+3t/6) ÷ (p÷6) p=6 t=4
Verizon [17]
Use PEMDAS.

6 + 3(4) / 6
6 + 12 / 6
6 + 2 = 8


6 / 6 = 1


8 / 1 = 8

I hope this helped.
5 0
3 years ago
Read 2 more answers
Other questions:
  • Write a C++ program that searches for anagrams in a dictionary. An anagram is a word obtained by scrambling the letters of some
    5·1 answer
  • What role do career pathways play?
    11·2 answers
  • Driving while wearing headphones or earphones
    12·2 answers
  • Describe FIVE significant advantages of web-based applications for an organisation.
    7·1 answer
  • Which statements describe the use of styles in Word? Check all that apply.
    11·2 answers
  • (Help please I don't know what to choose because it's both text and email but I can only pick one. HELP!!!!!!!!!!)
    6·2 answers
  • A browser allows you to set preferences for using the browser. These preferences include all of the following except
    7·1 answer
  • This is your chance to become the instructor. After learning the looping and input validation concepts, create a problem to give
    13·1 answer
  • FoRWarD MaRcH AND hERe We Go MEMbers of the agEncy BaKuGO AHHHHHHHHH-
    10·2 answers
  • Convert 12 bits to bytes​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!