1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
3 years ago
7

What are characteristics of fluent readers? Check all that apply. reading known words automatically pronouncing words correctly

reading words as quickly as possible understanding the meanings of the words being read O looking up all unknown words in the text being read
it's A,B,D​
Computers and Technology
2 answers:
IRINA_888 [86]3 years ago
7 0

Answer:

D,A,B hope this is it!!!!!

Alex17521 [72]3 years ago
7 0

Answer:

The person above me is correct

Explanation: credit to him

You might be interested in
Where is the spelling checker found in Excel?
laiz [17]
Simply press F7 or go to the tab 'Review' and --> left click 'spelling'. Located in the top panel.

This will enable the spell checking phase. 
7 0
3 years ago
Read 2 more answers
List out 20 output devices ​
GaryK [48]

Answer:

20 Examples Output Devices

Monitor.

Printer.

Audio Speakers.

Headphones.

Projector.

GPS.

Sound Card.

Video Card.

7 0
3 years ago
Read 2 more answers
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
A _______ is a particular type of report that is made up of strategic objectives and metrics to help the organization reach its
Reika [66]

Answer:

A balanced score card is a particular type of report that is made up of strategic objectives and metrics to help the organization reach its target measures in line with strategic goals

Explanation:

A balanced scorecard is a framework for strategic planning and performance , which be presented in the form of a report.It clearly outlines organizational goals into measurable quantities such as time, quality of service or product, performance and cost. With a balanced scorecard, the organization can set a strategy and measure it and then effectively monitor and track the progress and results of the strategy.

5 0
4 years ago
1,
sashaice [31]

Answer:

Match the methods:

See attached file

---------------------------------------------------------------------------------------------------------------------------------------

2)

Methods are public, and instance variables are private in common pattern of a class definition program.

So, the correct option is (C).

- -----------------------------------------------------------------------------------------------------------------------------------------

3) Java code:

//Create a Throttle called quiz with 100 positions<?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" />

Throttle quiz = new Throttle(100);

//Method that shifts quiz's flow to the halfway

quiz.shift(50);

//Display the current flow from quiz.

System.out.println(quiz.getflow());

-------------------------------------------------------------------------------------------------------

4)

Assume that the Foo class does not have a clone method. Then x is set to refer to a copy of y's object for an assignment x=y; in two Foo objects

.

So, the correct option is (A)

-----------------------------------------------------------------------------------------------------------------------------------------

5)

The correct option is

A)

mower.top and copter.top will always be two separate instance variables.

Explanation:

8 0
3 years ago
Other questions:
  • Please look at picture
    10·2 answers
  • Identifying what you will need to review takes place during?
    8·2 answers
  • How do you spell kiss in Japanese
    13·2 answers
  • Use the Web as a resource to study the PDF format. a. Describe how PDF provides output that is consistent across different types
    8·1 answer
  • A strategic business unit​ (SBU) of a major corporation has high market share in its​ industry, but the growth rate of the indus
    8·2 answers
  • 3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
    7·1 answer
  • What is your biggest takeaway on that subject?​
    8·1 answer
  • What is the advantages and disadvantages of hardware devices and software devices ?
    9·1 answer
  • What is included in a linked list node?
    14·1 answer
  • Is pseudocode obtained from Algorithm or is Algorithm obtained from pseudocode?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!