1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
3 years ago
14

A draft has the following: Plot Details Transition Words Important events in order

Computers and Technology
1 answer:
exis [7]3 years ago
7 0
What do you have to do?
You might be interested in
Can someone write me a design brief about a stadium​
Delicious77 [7]

Btw..which dtadium do u want cricket or football!?

3 0
2 years ago
Read 2 more answers
As important as it is to plan ahead, sometimes you_____.
timama [110]

Answer:

B. Can't stop things from doing wrong.

Explanation:

Life is never for certain there are so many unpredictable things that can happen like at one moment you are turning onto the street and you get into a car accident you didn't plan for that to happen. Anything can happen on a day to day basis that's why something can go wrong and all your plans won't work anymore.

4 0
3 years ago
Read 2 more answers
What are some other features of sending attachments in Outlook 2016? Check all that apply.
Elis [28]

Answer:

the answer is a, b,d on edg.

Explanation:

8 0
2 years ago
Read 2 more answers
Which of the following OSI layers is responsible for the segmentation, multiplexing, flow control and host-to-host communication
Lisa [10]

Answer:

Transport Layer

Explanation:

The transport layer which is responsible for end-to-end communication over a network. Transport Layer breaks the data, allocated by Application layer in smaller units called segments. It is used to number every byte in the segment. It is also responsible for error correction and provides reliability to the user. It allows the host to send and receive error corrected data, messages or packets  over a network and ensures  that data should be received in the same sequence in which it was sent.  It also enables multiplexing and flow control.

7 0
3 years ago
On tool hackers use to get sensitive information from victims is/are:
Feliz [49]
Pretty sure it’s keyloggers because it’s the only one that makes sense to me but I’m not 100% sure on that one
5 0
3 years ago
Read 2 more answers
Other questions:
  • To create a button that will allow a user to send the form data to the server you use a type of ____
    5·1 answer
  • What is software that helps a computer operate efficiently and keeps track of data on a computer?
    14·1 answer
  • Emotional intelligence is a new term to describe personal traits ?
    12·1 answer
  • Explain three applications of data mining
    14·1 answer
  • 1. Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bit memory address
    7·1 answer
  • You are required to design a 4-bit even up-counter using D flip flop by converting combinational circuit to sequential circuit.
    15·1 answer
  • 15. Write a program in python to read three numbers in three variables and swap first two variables with the sums of
    8·1 answer
  • Nathan wants to create multiple worksheet containing common formatting styles for his team members. Which file extension helps h
    9·1 answer
  • How do we prevent electrical problems as prescribe by the course?​
    11·1 answer
  • Record the issue of 4,000 shares of $5 par value common stock for $35000 cash
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!