1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dusya [7]
3 years ago
11

PLZ HELP I AM TIMED!!!!

Computers and Technology
2 answers:
den301095 [7]3 years ago
5 0

Answer:

A is the answer

Explanation:

A is the answer

Nataliya [291]3 years ago
4 0

Answer:

The correct answer is A.

Explanation:

I put D from the answer above and got it wrong and it said A was the correct answer. haha :)

You might be interested in
The benefit from dividing code into methods known as ________ is gained as follows: After you write code to perform a task once,
Fynjy0 [20]

Answer: B: Divide and Conquer

Explanation:

7 0
3 years ago
Sam works in a real estate office. An offer comes in on a house but the homeowners are on vacation. He needs the homeowners to s
Digiron [165]

Answer:

Sam should send a digital document and request a signature. The could be fax or even an image printed out, if neither is possible get in contact with eh owner and his lawyer for more help.

Explanation:

3 0
3 years ago
For what reason can security risks never be fully eliminated?​
raketka [301]

Answer:

A vulnerability level of ZERO can never be obtained since all countermeasures have vulnerabilities themselves. For this reason, vulnerability can never be zero, and thus risk can never be totally eliminated.

Explanation:

also we need to be protected from scams and stuff

7 0
3 years ago
Write the syntax of FOR......NEXT loop​
anygoal [31]

Answer:

Syntax:

For variable_name As [Data Type] = start To end [ Step step ]

For variable_name As [Data Type] = start To end [ Step step ]

[ inner loop statements ]

Next.

[ Outer loop statements ]

Next.

Explanation:

4 0
3 years ago
Where should citations be included in your research paper? Select all that apply.
yKpoI14uk [10]

Answer:

it would be the first one because it's the header and that's what applies

5 0
3 years ago
Other questions:
  • A ____ is harmful computer code that spreads without your interaction, slipping from one network to another and replicating itse
    15·1 answer
  • Phoebe has to give a permission about recycling. Where should she look while presenting?
    11·1 answer
  • Bluetooth © and Wifi are two examples of transmission protocols. Which of the following statements about them is true?
    9·1 answer
  • Under which of the following conditions will evaluating this boolean expression
    7·1 answer
  • While speech recognition can operate without any confi guration, you can train it to more accurately recognize your voice. true
    5·1 answer
  • How do media and networks interact? A. Networks and media work in exactly the same way. B. Media are connected to networks that
    8·1 answer
  • What are the benefits of using an ordered list vs. an unordered list? What are the costs?
    10·1 answer
  • technician is dispatched to troubleshoot a user's computer. After performing diagnostics, the technician determines that drive t
    5·1 answer
  • File-sharing utilities and client-to-client communication applications can provide the capability to share files with other user
    14·1 answer
  • With a(n) ____ you can arrive at a scene, acquire the data you need, and return to the lab as quickly as possible.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!