1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeyben [28]
2 years ago
14

Give short answers.

Computers and Technology
1 answer:
Mkey [24]2 years ago
6 0

Answer:

H) Well it depends how you put it. I'm Doing virtual School for my education. And it is so easy when we have technology out their to provide the help that we need. So I think it has affected education pretty good. You can Also google the answers.

I) Looking up Answers at home

J) Parents can check up on their child's school work and see if they can help them. Also The law is involved in Education.

K) It depend's on how you put it

Explanation:

Short Answers

You might be interested in
What is the working principle of computer?
ankoles [38]
The CPU is the working principle
8 0
3 years ago
Screen reader software is an example of a(n) ____.
s2008m [1.1K]
<span>It is an example of an assistive output device. These are an example of assistive technology, which is any technology optimized to help the user mitigate the aspects of a disability. This may enable them to use the technology as intended, or it may also assist them in functioning in their everyday lives.</span>
3 0
3 years ago
Studios had to forgo the theatre business in the late_1__ because of the rising theatre rents and advertising costs. Television
uysha [10]

Answer:

gfdhdf

Explanation:

6 0
3 years ago
For which firewall feature should you create forward trust and forward untrust certificates?
guajiro [1.7K]

Answer:Jun 19, 2019 - Additionally, set up a forward untrust certificate for the firewall to ... After setting up the forward trust and forward untrust certificates required for SSL Forward Proxy ... If you do not install the forward trust certificate on client systems, ... Create a Decryption Policy Rule to define traffic for the firewall to decrypt.

WELCOME

8 0
3 years ago
Anti-bullying laws in most states are designed to provide
Vera_Pavlovna [14]

Answer:

to protect children enrolled in kindergarten, elementary, and secondary schools and learning centers ( from being bullied. It requires Schools to adopt policies to address the existence of bullying in their respective institutions.

Explanation:Hope this helps pls mark brainliest!

6 0
2 years ago
Other questions:
  • Barr the Bear has started a business to sell fish to Poe and his fellow penguins. The penguin customers submit many fish orders,
    12·1 answer
  • What kind of voltage do solar cells generate? Solar cells produce ______ voltage which is not usable by most household appliance
    15·1 answer
  • What is another name for “low-angle lighting”?
    7·1 answer
  • A chef writing up her famed recipe for beef stew realizes she has switched parsley and oregano everywhere in the recipe. The che
    13·1 answer
  • ___MSDS provides information on how to handle, store, discard and care for potentially hazardous chemicals. true or false?​
    5·1 answer
  • Clarice is an architect who is involved in design work on a restaurant in a building that used to be part of the city’s water wo
    8·1 answer
  • In a program you need to store identification numbers of 5 employees and their weekly gross pay.
    11·1 answer
  • Describe four traditional tehniques for collecting information during analysis.
    11·1 answer
  • Explain with examples what is software​
    6·1 answer
  • An online bank wants you to create a program that shows prospective
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!