1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrei [34K]
3 years ago
13

B) Explain in detail the three technologies commonly used in display

Computers and Technology
1 answer:
wlad13 [49]3 years ago
5 0

Answer:

b i think

Explanation:

You might be interested in
Make me die from laughter i will give brainlyest for the best joke
zepelin [54]

Answer:

The homework assignment for my Spanish class was to write a paragraph. When I returned their papers, I asked one student if he had used Google Translate or any other online translator to write his paper. He categorically denied doing so. That led to my next question: “Then why is this in French?”

Explanation:

7 0
3 years ago
One limitation of high-level programming languages is
faltersainse [42]

Answer:

One limitation of high-level programming languages is It takes additional translation times to translate the source to machine code

<em>High level programs are comparatively slower than low level programs. Compared to low level programs, they are generally less memory efficient. Cannot communicate directly with the hardware.</em>

4 0
3 years ago
Which of the following types of access controls do not describe a lock? (a)- Directive (b)- Physical (c)- Preventative (d)- Dete
Mrac [35]

Answer:

Directive

Explanation:

A directive access control is used to direct, confine, or control the actions of subject to force compliance with security policies. Some examples of direct access controls are: security guards, guard dogs, posted notifications, monitoring, supervising, work task procedures, and awareness training. It can also be categorized by how it is implemented; for example, it can be administrative, logical/technical, or physical.

7 0
3 years ago
Osing Commands
Sedaia [141]

Answer:

Beggin the perfume and I Can Do B the work done ✅ you are the instances of a marriage license pa bili kami ulam namin pwede po ma'am pwede the too much talking to the work done na na lang sa pag you po sir I will be solemnized

5 0
2 years ago
Which of the following technologies is the best choice to convey urgent and highly sensitive information?a. Telephone b. Fax Let
Setler79 [48]

Answer:

C. E-mail

Explanation:

Electronic mail is the best choice to convey urgent and highly sensitive information

8 0
3 years ago
Other questions:
  • What information is not typically included in an e-mail header?​?
    15·1 answer
  • A new company is upgrading a media workstation. The computer will be predominantly used for graphic intensive presentations, sli
    13·1 answer
  • Siva added a "Contact Form" to her website.
    10·1 answer
  • Create a calendar named fitness and then display it in a calendar view with the default calendar.
    15·1 answer
  • Working for the Internal Revenue Service is a career in public safety. A. True B. False
    14·1 answer
  • What is an infrastructure dedicated to one organization
    13·1 answer
  • Edhesive 9.3 code practice
    11·1 answer
  • Hyperlink is a term used to refer to the specific manner of specifying the address of a website. Write reason for true or false.
    10·1 answer
  • When conducting memory and recall tests, some people make an effort to normalize memories by not reporting extreme cases. this l
    12·1 answer
  • A technique that was developed to determine whether a machine could or could not demonstrate the artificial intelligence known a
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!