1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
3 years ago
14

A draft has the following: Plot Details Transition Words Important events in order

Computers and Technology
1 answer:
exis [7]3 years ago
7 0
What do you have to do?
You might be interested in
I know that this will be taken down for not being a real question but is anyone else not able to search for anything? I can type
Schach [20]

Answer:

Sameee

Explanation:

6 0
2 years ago
Taylor develops a prototype for a new smartphone. It only includes code, a way to process the input, a memory card, and a microp
marysya [2.9K]

Answer:

i would say C.output

Explanation:

the program would be the code, the input would be the input, and the memory card would be the memory leaving the output as the only thing forgotten.

6 0
3 years ago
Read 2 more answers
Describe the conventional method of data processing​
andreyandreev [35.5K]

Answer:

The data processing is broadly divided into 6 basic steps as Data collection, storage of data, Sorting of data, Processing of data, Data analysis, Data presentation, and conclusions. There are mainly three methods used to process that are Manual, Mechanical, and Electronic.

4 0
2 years ago
Read 2 more answers
An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks
Fittoniya [83]

Answer:

e. Phishing

Explanation:

Phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

Attackers use it to steal sensitive user data or information.

5 0
3 years ago
Read 2 more answers
What percent of records are temporary, if you are not in the OSD?​
3241004551 [841]

Answer:

Headed by the OSD Records Administrator, the OSD Records and Information Management (RIM) Program is responsible for oversight, implementation of the Federal Records Act within the Offices of the Secretary of Defense and the WHS supported Defense Agencies and Field Activities.

Explanation:

6 0
3 years ago
Other questions:
  • Which piece of personal information do websites often require users to enter?
    6·2 answers
  • )How to extract a specific element of item in a list?
    13·1 answer
  • Consider a multiprocessor CPU scheduling policy. There are 2 options: 1) a singlecommon ready queue of jobs; when a CPU becomes
    8·1 answer
  • You have a network of 300 users. You are finding that you must frequently restore files from backup that users have accidentally
    13·1 answer
  • . What is automated testing?
    10·1 answer
  • At an open or uncontrolled intersection, yield if ____.
    15·2 answers
  • David owns a retail business that just implemented a web app to supplement sales. He needs to choose an attribution partner to i
    15·1 answer
  • It takes 2.5 yards of material to make a dress harleys clothing design estimates that they can produce 48 dresses each week.if t
    15·2 answers
  • Explain motherboard in detail
    14·2 answers
  • Technology has had
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!