1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ehidna [41]
3 years ago
13

Employing the use of a(n) will help you manage a STEM project.

Computers and Technology
1 answer:
LiRa [457]3 years ago
7 0

Answer:

technicians

Explanation:

the answer is technicians. in my freshmen year we made flash cards and i still have them so i remember it.

You might be interested in
You do not need to remove the lead weights inside tires before recycling them. A) TrueB) False
mel-nik [20]

Answer:

b you need to my dad is a car repair man and so am i

Explanation:

5 0
3 years ago
Please help me with this!!
lisabon 2012 [21]

Answer:

sort(), incomes, newWord = word1 + word2 , ressource document, add()

Explanation:

3 0
3 years ago
15. A mechanism by which other modules, such as I/O and memory, may interrupt the normal sequencing of the processor is called (
mestny [16]

Answer: (C) Interrupt

Explanation: Interrupt is sort of a signal that is responsible for breaking of the continuity or sequence by occurring in hardware or software. Thus, input, output and memory may experience some sort of error in their sequence that is known as interrupt. The interrupt is a temporary situation and can be managed using a interrupt handler.Hardware are usually of two type - hardware interrupts and software interrupts.

3 0
3 years ago
Define types of hacker ? with three to four line of each types?​
Strike441 [17]
1.) benevolent hackers are hackers that use their skills to assist people in getting back stolen information, and usually put bad people in their place
2.) malevolent hackers use their skills to cause harm to others by either stealing information or leaking it, hacking into social media accounts or by infiltrating computers and implanting malware of some kind, but this isn’t normally done by hacking, you can do it just by sending an email with a sneaky link or virus in it.
Those are the two main types but there are also hackers who work for the government as cyber security protection or even to hack into targets of the government.
5 0
3 years ago
Using only what you have learned in class, create a webpage that has two divs on it: input and output. Only the input div is edi
Alexxandr [17]

IdkAnswer:

Explanation:

8 0
3 years ago
Other questions:
  • While inspecting an element in the DOM on my website using the Chrome Devtools I accidentally deleted the DIV that had all my au
    8·1 answer
  • List three advantages of using computers for weather forecasting instead manual system
    11·1 answer
  • What is the outcome of using the formula =AVERAGE(A12:A20)?
    10·2 answers
  • Implementing multiple types of technology and thereby precluding that the failure of one system will compromise the security of
    11·1 answer
  • Scientists measure an object’s mass in kilograms and its weight in newtons. If you knowthe amount of mass of an object in kilogr
    5·1 answer
  • Secondary hard drive whats its purpose
    5·1 answer
  • How is the “conflict set” defined in Production systems?How conflict is resolved ?
    8·1 answer
  • If you are Rich In adopt me friend me And give me pets Please
    5·2 answers
  • PLEASE HELP!
    5·1 answer
  • PLEASE HELP WILL MARK AS BRAINLIEST
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!