1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vesna_86 [32]
3 years ago
12

Drag the tiles to the correct boxes to complete the pairs.

Computers and Technology
1 answer:
lianna [129]3 years ago
4 0

Answer:

software

client devices

hardware

Explanation:

Plzzzzzzzzzzzzz give me brainiest

You might be interested in
Which of these words does not describe factual data
kipiarov [429]
The correct answer is "opinion".

<span>Opinions are almost never factual which is why they are opinions. </span>
5 0
3 years ago
Read 2 more answers
What did early computers use to store each bit?
Damm [24]

Answer:

A vacuum tube

4 0
3 years ago
Read 2 more answers
For an activity with more than one immediate predecessor activity, which of the following is used to compute its earliest finish
laila [671]

Answer:

The correct option is A

Explanation:

In project management, earliest finish time for activity A refers to the earliest start time for succeeding activities such as B and C to start.

Assume that activities A and B comes before C, the earliest finish time for C can be arrived at by computing the earliest start-finish (critical path) of the activity with the largest EF.

That is, if two activities (A and B) come before activity C, one can estimate how long it's going to take to complete activity C if ones knows how long activity B will take (being the activity with the largest earliest finish time).

Cheers!

7 0
3 years ago
What are 3 possible causes of getting a "network cable unplugged" message on a pc, assuming that the cable is not actually unplu
Nat2105 [25]
I've had that problem before. The cause of my problem was 2 things and that was the age of the cable, and build up of dust on each of the cable.
7 0
4 years ago
Select all of the following statements regarding security policy that are true.
a_sh-v [17]

Answer:

C and D

Explanation:

Your company should have a written security policy, and all employees should have access to the policy, even if they're casual workers.

Also, Training on computer security should be provided for all staff members as a prerequisite to start work.

3 0
3 years ago
Other questions:
  • PLC software does not typically fail or break​
    15·1 answer
  • A block style business letter is:
    5·1 answer
  • Write a program that reads numbers from a file (or allow user to input data) and creates an ordered binary tree. The program sho
    8·1 answer
  • Ideally, how often should you back up the data on your computer? once an hour once a day once a month once a year
    14·2 answers
  • Jenis jenis perangkat keras?
    14·1 answer
  • The most important hardware device for connecting supercomputers over a wide area
    10·1 answer
  • _____ are fields that are used to personalize a mail merge document
    9·1 answer
  • rue or false: The first web browser was introduced to the public in the 1970s and started the explosive growth of the Internet i
    15·1 answer
  • A government agency is getting rid of older workstations. The agency will donate these workstations, along with other excess com
    9·1 answer
  • Assume the name of your data frame is flavors_df. What code chunk lets you review the structure of the data frame?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!