1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ozzi
3 years ago
14

2. Kabel yang digunakan pada jangan wireline, sebagai

Computers and Technology
1 answer:
Mumz [18]3 years ago
7 0
It’s b ........................................
You might be interested in
What HTML tag would you use to indicate a line break?
DIA [1.3K]

Answer:

<br> APEX Verified

Explanation:

8 0
3 years ago
Can someone help: how to get binary?
xxTIMURxx [149]

Answer:

Explanation:

SENN KİMSİİİİİİİİN???

8 0
2 years ago
Read 2 more answers
Helllp me you will git 16 points
siniylev [52]

Answer:

False

Hope it helps...

Have a great day :P

8 0
3 years ago
Read 2 more answers
Generally considered to be the most important information security policies, what item below defines the actions a user may perf
tamaranim1 [39]

Answer:

A. Acceptable use policies

Explanation:

These specific actions that the user may perform are all described in the acceptable use policy. The company usually requires that the user read and sign this policy before being granted a network ID into the system itself. By signing this agreement the individual user agrees to perform ONLY the actions listed in the agreement and nothing else and are restricted from unauthorized areas.

3 0
3 years ago
A Program is an Algorithm – a set of directions for the computer to follow.<br><br> True<br> False
d1i1m1o1n [39]

Answer:

True

Explanation:

5 0
3 years ago
Other questions:
  • Web services can exchange information between two different systems only if the operating systems and programming languages upon
    10·1 answer
  • // This pseudocode is intended to display // employee net pay values. All employees have a standard // $45 deduction from their
    12·1 answer
  • What is the purpose of an arraignment?
    9·2 answers
  • /*
    8·1 answer
  • How do you copy and paste a screenshot on an hd computer
    12·2 answers
  • Computers that are close to one another are connected to form a LAN
    7·1 answer
  • All dogs = 199999990158161231
    11·2 answers
  • Designations at the end of file names such as .docx and .html are called
    7·1 answer
  • How do you put text in MS publisher?<br><br> When do you use text wrapping?
    14·1 answer
  • When you save a presentation with a .potx file extension, which type of powerpoint file is created?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!