1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ella [17]
3 years ago
15

A sandbox is known as a holding area for website or .

Computers and Technology
2 answers:
Bingel [31]3 years ago
7 0

Answer:

blog

Explanation:

Vikki [24]3 years ago
3 0


..........answer is above or below me lol
You might be interested in
Ten(10) examples of wearables or wearable technologies?​
Semmy [17]

Answer:read

Explanation:

airpods

headphones

earbuds

AirPods  pro

watch

fitbit (type of watch that counts your miles) &you can say workout watch&

VR set

technology bracelet

smart glasses

Smart ring

7 0
3 years ago
In an advertisement, a speed specification, such as 2.66 ghz, indicates the speed of the microprocessor?
Ray Of Light [21]

Answer:

yes / true

Explanation:

it is one of the factors in determining the speed of the microprocessor

5 0
2 years ago
IBM’s system that is built on the middle ground approach to AI.
Norma-Jean [14]

Answer:

IBM Watson is AI for business. Watson helps organizations predict future outcomes, automate complex processes, and optimize employees' time.

Explanation:

6 0
3 years ago
Draw a class diagram for point of sale system with association and<br>multiplicity.<br>​
ss7ja [257]

Answer:

find it ur self

Explanation:

6 0
3 years ago
To protect your answers after completing an assignment, what should you do? close your browser window. let someone else start wo
zhenek [66]
That should be log out correct....
8 0
3 years ago
Other questions:
  • __________ BI apps use real-time or near real-time data in order to support line managers who need to monitor performance of his
    7·1 answer
  • Which are malicious codes? <br><br> JavaScript <br> Key loggers <br> Scrum <br> Spyware <br> Worms
    12·1 answer
  • Match the software requirements of a server to their purpose
    5·1 answer
  • Every character is represented by a code. The ASCII code for upper letter A is 65 and for lower a is 97. Similarly the numeric c
    9·1 answer
  • 3. Which one of the following statements is correct? _____ variables are those whose storage bindings are created when their dec
    12·1 answer
  • HELP ME!! <br> it’s a cross word, but I don’t know the answers, 25 points
    12·1 answer
  • Attackers need a certain amount of information before launching their attack. One common place to find information is to go thro
    11·1 answer
  • Where must virtualization be enabled for VM (virtual machine) software to work?
    14·1 answer
  • 19 dollar fortnite gift card
    14·2 answers
  • Use the drop-down menus to complete the statements about Search Folders.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!