1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
3 years ago
7

What are characteristics of fluent readers? Check all that apply. reading known words automatically pronouncing words correctly

reading words as quickly as possible understanding the meanings of the words being read O looking up all unknown words in the text being read
it's A,B,D​
Computers and Technology
2 answers:
IRINA_888 [86]3 years ago
7 0

Answer:

D,A,B hope this is it!!!!!

Alex17521 [72]3 years ago
7 0

Answer:

The person above me is correct

Explanation: credit to him

You might be interested in
Write an algorithm to convert lengh of your house from cm to meter​
sergiy2304 [10]

Answer:

cm = 1000;

 

meter = cm / 100.0;

kilometer = cm / 100000.0;

 

print("Length in meter = " ,

              meter , "m");

print("Length in Kilometer = ",

            kilometer , "km");

Explanation:

This is in Python, hope you enjoy!

8 0
3 years ago
Some request lists might cause the disk scheduler to act the same when the three different algorithms are run. Create a request
storchak [24]

Answer:

35, 25, 50, 75, 95

Explanation:

List of five track numbers that will cause all three algorithms to visit the same tracks in the same order are -

35

25

50

75

95

Please go to attachment for the diagram how these 5 tracks will be traversed by various algorithms.

All the algorithms traverse in the order 35 -> 25 -> 50 -> 75 -> 95

7 0
4 years ago
What is the term for the process of swapping items between memory and storage?
Naddik [55]
Swapping pages of memory from core memory and disk is called swapping in Unix, and paging in Microsoft.
3 0
3 years ago
Read 2 more answers
In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
Neporo4naja [7]

Script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

<h3>The types of threat actors.</h3>

In cybersecurity, there are different types of threat actors and these include the following:

  • Script kiddie
  • Gray hat hacker
  • Hacktivists

One of the ways to differentiate an attack orchestrated by a script kiddie from that of a gray hat hacker is that script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

4 0
2 years ago
What area displays the title of the document
stich3 [128]

Answer:

The Title Bar

Explanation:

It is the part of the Software that not only tells you the name/title of the software but also the file name.

8 0
4 years ago
Read 2 more answers
Other questions:
  • Mary’s computer is running slow and will not load programs or videos. She has tried restarting her computer yet it is still not
    15·1 answer
  • in the breezy python gui module, what class provides the basic functionality for any window, such as the command buttons in the
    10·1 answer
  • What is computer virus?
    8·1 answer
  • Stella likes using social networking websites. Which Netiquette practice should Stella follow?
    9·2 answers
  • Write a program that will draw a red circle on top of a blue square in the center of the canvas. The blue square should have sid
    12·1 answer
  • Megahertz is a measurement of
    13·1 answer
  • In Linux, users are internally represented using a unique number called user ID or uid.
    9·1 answer
  • Data is communicated through various input devices true or false​
    8·1 answer
  • What is utility Software​
    14·1 answer
  • A friend asks you to look over the code for an adventure game and help figure out why it won’t work. Which of these options is s
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!