1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anygoal [31]
3 years ago
14

What responds to both visual appeal and functional needs? (1 point) A.) applied art B.) performance art C.) fine art D.) visual

art
Computers and Technology
1 answer:
d1i1m1o1n [39]3 years ago
6 0

Answer:

a

Explanation:

You might be interested in
Who began digitizing books on a massive scale and putting them online?
Sholpan [36]

The answer is Google Cooperation.

Google began the mass digitization of bound volumes of books and as a result, it is getting widespread media attention. Google has had, and is still keeping up with its intention to digitize all the books across major USA libraries. Its intention is not to provide a reading environment, but rather create an online index to books in libraries and bookstores.

4 0
3 years ago
Please choose the correct citation for the case which established the "minimum contacts" test for a court’s jurisdiction in a ca
IRINA_888 [86]
Beep boop celery fart
6 0
3 years ago
What type of windows network model allows all the participants to be represented equally on the network with no single computer
noname [10]
The workgroup as a type of windows network model allows all the participants to be represented equally on the network with no single computer having authority or control over another. The workgroup is peer-to-peer local area network. 
Members of this network group can share files, printers, Internet connection.<span> and other local network resources.</span>
4 0
3 years ago
IP ______ occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.
Veseljchak [2.6K]

Answer:

Spoofing

Explanation:

Spoofing that occurs when an intruder computer fools network into believing its IP address is associated with trusted source

5 0
2 years ago
Do you watch markiplier?
ki77a [65]

Answer: Yes

Explanation: He is cool

5 0
3 years ago
Read 2 more answers
Other questions:
  • Many shops are simply plugging up their drains to keep from inadvertently violating the law and creating environmental contamina
    15·1 answer
  • Which of the following is an example of a good listening skill? A. Replying to the caller as "you" rather than using his or her
    9·2 answers
  • System uses a 6-bit 2’s complement signed integer representation. What is the range of decimal values it can represent?
    14·1 answer
  • An individual is first with the network before they are authorized to access resources on the network A. countermeasure B. vulne
    11·1 answer
  • How does a layered pattern make use of abstraction and encapsulation?
    10·1 answer
  • What is the difference between a software engineer and a system analyst?
    8·1 answer
  • What is the reasoning you would write an inquiry to a company?
    5·2 answers
  • What error occurs in the following program? #include using namespace std; int main() { int number1, number2, sum; cout &lt;&lt;
    13·1 answer
  • a publication usually issued daily,weekly or other regular times that provides news,views,features and other information of publ
    8·1 answer
  • The small flash memory used in<br>protable device like Laptop<br><br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!