1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hram777 [196]
3 years ago
9

Which is an appropriate strategy for using a workplace blog?

Computers and Technology
1 answer:
OLEGan [10]3 years ago
8 0

Answer:

a

Explanation:

You might be interested in
Adam, a college student, downloads a document containing resume templates from the Internet. When he opens the document
pishuonlain [190]

Answer:

B

Explanation:

Because I have used it and if you download any file it says protected view click here to enable editing

4 0
3 years ago
Select the data type for each example below. <br> Possible answers<br> -Int<br> -float <br> -string
Shkiper50 [21]

Answer:

2.5 = float

'2.5' = str

3 = int

Explanation:

The data type: "float" is used for positive or negative decimals.

The data type: "str" is used for a sequence of letters, numbers, or symbols. Since the decimal used apostrophes, this means it's a character literal.

The data type: "int" is used for any positive or negative whole number.

7 0
3 years ago
Lee finishes entering all the data. Next, he wants to format the header row so it is easier to read and stands out from the rest
dangina [55]

Answer:

A: Add shading to the top row

B: Change the style of the table

Explanation:

Just got the question myself and got the answer from it

6 0
3 years ago
A major concern about ESP claims is that proponents explain both the positive and negative findings. By explaining the negative
4vir4ik [10]

Answer: Falsifiability

Explanation: Falsifiability is the term that is defined as the evaluation of any particular hypothesis or theory to be proven wrong .This feature gives the access that the theory can be tested and have more accurate claims .

The ESP(Extrasensory perception) theory  can also have feature of being falsifiable because the experiments and test lead to the issue that the negative effects of the theory are not certain which might occur due to simple observation of effects.

5 0
4 years ago
Order the following routine maintenance tasks from most to least important when securing a computer. a. Verify anti-malware sett
spin [16.1K]

Answer:

The following are the order of the routine maintenance tasks that is C, A, B, D

Explanation:

For securing the computer system the user has to follow some steps related to the routine maintenance tasks.

  • Firstly, the user has to validate the settings on the Windows Update.
  • Then, they have to validate the settings on the anti-malware software.
  • Then, the user has to validate the setting related to the file-sharing system.
  • Finally, they have to validate the frequent optimization of hard drives or hard disks.
7 0
3 years ago
Other questions:
  • according to the National Automobile Dealers Association, a single dealership may employ people with as many as 57 different A.
    6·1 answer
  • For window 7 explain the steps you will use to find the available program you will list.
    13·1 answer
  • Which question best helps a reader understand a plot’s exposition? What will life be like after the character takes action? How
    14·2 answers
  • In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism b
    7·1 answer
  • Suppose you have two tables: officer and gentleman. what question(s) can be asked by using the union operator?
    11·1 answer
  • Anyone Free to Talk??????? I'm Bored :(
    6·2 answers
  • write a program in which the user can enter X amount of numbers. Once the user has enter 10 positive numbers, the user may not e
    7·1 answer
  • Describe how computers are used to access, retrieve, organize, process, maintain, interpret, and evaluate data and information.
    13·1 answer
  • Why is this cite so rigged
    10·1 answer
  • 1. What type of malware is triggered by a specific condition, such as a specific date or a particular user account being disable
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!