1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexira [117]
3 years ago
15

Students who understand what the teacher is saying do not need to take notes.

Computers and Technology
2 answers:
padilas [110]3 years ago
6 0
Trueeeeeeeeeeeeeeeeee
adell [148]3 years ago
6 0

Answer:

TRUEE!!!

Explanation:

I have ears and they are for listening, Which process the info i heard nd it goes to my brain.

EASSY

~Hope this helped❤️❤️❤️

You might be interested in
Why is it important to proofread your work even after using the Spelling and Grammar tool?
Reil [10]

Answer:

To catch mistakes the spelling and grammar check will not catch.

Explanation:

Grammar and spelling check is not always perfect!

7 0
3 years ago
Select the correct answer.
DochEvi [55]

Answer:

ask customers to use strong passwords to protect their accounts

6 0
3 years ago
Read 2 more answers
In terms of shaping the future of cybersecurity in the United States, how influential do you think the Russian hacking efforts o
Norma-Jean [14]

The influence of the Russian hacking efforts of the 2016 election was known to be greater when compare to things like the Creeper Virus, Morris Worm, or Captain Zap’s hacking of the AT&T online computer system.

<h3>What aspects of this incident could get in the way of the U.S. government responding effectively to the risks the hacking poses?</h3>

The aspect that government that government need to guard against is  stealing of government and business secret as well as people's personal information.

Note that they are a lot of tools that are known to be made up of the National Cybersecurity Protection System such as the EINSTEIN cyber intrusion detection system  and others.

Therefore, The influence of the Russian hacking efforts of the 2016 election was known to be greater when compare to things like the Creeper Virus, Morris Worm, or Captain Zap’s hacking of the AT&amp;T online computer system.

Learn more about Cybersecurity from

brainly.com/question/28004913

#SPJ1

6 0
2 years ago
______________ are used to store information that will be referenced and manipulated in a computer program. They label data with
Bond [772]

Answer:

Variables. Variables are used to store items in a database so that humans and the computer can better understand the program, and use later on for referencing.

5 0
2 years ago
Disk based recording systems are always (A) digital (B) analog (C) Both digital and analog
Allushta [10]

Answer:Disk based recording systems are always Digital.

6 0
3 years ago
Other questions:
  • Which of the following is a benefit of using technology? a. It increases the number of human service providers in firms. b. It i
    12·1 answer
  • On the Visit screen, you will not see one of the following:
    13·1 answer
  • Does anyone know a way to skip the videos on Edgnuity?
    15·1 answer
  • The three main types of banks (Large Traditional, Credit Union, Online or Online-Only) have many tradeoffs with respect to techn
    15·2 answers
  • : How can Internet technologies help a business form strategic alliances with its customers, suppliers, and others?
    10·1 answer
  • In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer
    14·2 answers
  • ________ is a technique where the general characteristics are kept and the details are hidden.
    15·1 answer
  • How do you determine if a name is a variable holding a value or if it is a function call?
    6·1 answer
  • Take values of length and breadth of a rectangle from the user and check if it is square or not.
    8·2 answers
  • Tools such as microsoft's word, excel, and powerpoint are examples of ________ software. question content area bottom part 1 a.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!