1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lidiya [134]
3 years ago
5

How are computers connected to one another?

Computers and Technology
2 answers:
Wewaii [24]3 years ago
8 0

Answer:

the other guy is correct

Explanation:

sergeinik [125]3 years ago
7 0

Answer:

They are connected through networks

Explanation:

N/A

You might be interested in
If one breakfast meal of banana lacatan, scrambled egg, plain rice, and hot milk contains 58 grams carbohydrate, 12 grams protei
enyata [817]

Answer:

Total amount of calories = 325

Explanation:

Given:

Amount of carbohydrate = 58 gram

Amount of protein = 12 gram

Amount of fat = 5 gram

Find:

Total amount of calories

Computation:

1 gram protein = 4 calories

1 gram carbohydrate = 4 calories

1 gram fat = 9 calories

Total amount of calories = (58)(4) + (12)(4) + (5)(9)

Total amount of calories = 232 +48 + 45

Total amount of calories = 325

5 0
3 years ago
What steps can be used to password-protect a worksheet?
muminat

Answer:

Review

Changes

Protect sheet

Explanation:

I did it

8 0
3 years ago
Create a poem about MS powerpoint presentation
iren2701 [21]
You could use poem generator online or see samples and change some words
5 0
3 years ago
An administrator has initiated the process of deploying changes from a sandbox to the production environment using the Force IDE
Pani-rosa [81]

Option A because the environment should be selected for which the changes are to be applied. In a time Force IDE has many project environments for example maybe a java project and C++ project would be there on sandbox, so the environment selection is important.

Option B because the related changed sets should be specified so that other developers that have access to the project can see the changes being made.

Option D The data fields that are needed to be deployed should also be provided so that the updated version can be seen by other developers.

Rejected Options :

Option C user name and password has nothing to do with the production environment because if the user has it only then it can come and make changes.

6 0
3 years ago
# 12/9/2020
EastWind [94]

where it says   " def main() " there needs to be something in the "()"

Hope this helps.   : )

3 0
3 years ago
Other questions:
  • The number of operations executed by algorithms A and B is 40n2 and 2n3, respectively. Determine n0 such that A is better than B
    12·1 answer
  • Select the correct answer.
    15·1 answer
  • "what are the problems with tcp over wireless network?"
    15·1 answer
  • Human factors is the study of:
    5·1 answer
  • How are traditional technology and modern technology related to each<br>other? ​
    9·2 answers
  • When performing actions between your computer and one that is infected with a virus, which of the following offers NO risk of yo
    11·2 answers
  • Find the Nearest Repeated Entries in an Array People do not like reading text in which a word is used multiple times in a short
    15·1 answer
  • ¿porque y como surge la informatica y las computadoras
    13·1 answer
  • Write the line of code to calculate the area of a circle with radius 3 and store it in a variable called
    10·1 answer
  • Which unit of binary storage has a size that is processor dependent?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!