1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
torisob [31]
3 years ago
13

Which phrase suggests feedback?

Computers and Technology
1 answer:
butalik [34]3 years ago
7 0

Answer:

They also gave suggestions on some modules and said they would like to work with his team in the future.

Explanation:

This statement suggests feedback because, here the client gives Richard and his team some suggestions on what they can do with the modules. It implies that the client must have tested the software application and observed its functionality.

You might be interested in
A 9-year old male castrated Westie presents on emergency after being rescued from a house fire. On presentation, the dog has a r
satela [25.4K]

Answer:

Carbon Monoxide poisoning

Explanation:

According to my research on studies conducted by various medical professionals, I can say that based on the information provided within the question the most likely cause for this is Carbon Monoxide poisoning. This is a gas very similar to oxygen although it is poisonous to living organisms and very flammable. When inhales displaces oxygen on hemoglobin molecules which then formes carboxyhemoglobin complexes, which causes the mucous membrane to become bright red.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
Câu 4. Trong môi trường lập trình CodeBlocks phím F9 dùng để: A. Biên dịch chương trình B. Chạy chương trình C. Soạn thảo chương
Debora [2.8K]

Answer:

câu trả lời là c nha

Explanation:

7 0
3 years ago
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
uysha [10]

Answer:

Security Tab is the correct answer.

Explanation:

The Security Tab will enable the users to authorize anyone to use that file or directory.Many clients deleted the security tab because After that nobody can alter the security privileges on the device.

  • With the help of the Security tab, we will minimize the ActiveX attacks on Internet Explorer. This option is available in the Internet Options of the dialog box.
  • Other options are incorrect because they are not related to a given scenario.
8 0
3 years ago
A county collects property taxes on the assessed value of property, which is 60 percent of its actual value. For example, if a h
Zolol [24]

Answer:

actual_value = float(input("Enter the actual value of a piece of property: "))

tax_rate = float(input("Enter the current tax rate for each $100.00 of assessed value: "))

assessed_value = actual_value * 0.6

tax = (assessed_value * tax_rate) / 100

print("The annual property tax is $" + str(tax))

Explanation:

*The code is in Python.

Ask the user to enter the actual value and the tax rate

Calculate the assessed value, multiply the actual value by 0.6

Calculate the tax, multiply the assessed value by the tax rate and divide result by 100

Print the tax

7 0
4 years ago
When installing a Windows 10 an already installed Windows 7 what happen​
astra-53 [7]

Answer:

are u updating it? or u r rooting it?

4 0
3 years ago
Read 2 more answers
Other questions:
  • If the wrong server edition is installed, what command can be used to change to a different edition?​
    5·1 answer
  • ______________is a collection of technologies for abstracting the details of how applications, storage, network, and other compu
    6·1 answer
  • When there is a limited amount of a product, such as rare art or collectible
    13·1 answer
  • Write a program segment that simulates flipping a coin 25 times by generating and displaying 25 random integers, each of which i
    5·1 answer
  • While you work on the customer’s printer, he continues chatting about his network and problems he’s been experiencing. One compl
    14·2 answers
  • How many bits are reserved for the Transmission Control Protocol (TCP) flags?
    11·1 answer
  • Fuction table of JK-Flip flop?
    11·1 answer
  • . Is it conceivable to design a secure operating system for these computer systems? Give arguments for and against.
    6·1 answer
  • What are a few ways to format the text in a mail message in Outlook? Check all that apply.
    7·2 answers
  • Anybody know the answer to this question?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!