1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tigry1 [53]
3 years ago
5

Heeeeeeeelp :) thx jfdyiusjmkdsuiho;dmcvrvho;j

Computers and Technology
2 answers:
anastassius [24]3 years ago
7 0

Answer:

I think option C is correct

NNADVOKAT [17]3 years ago
4 0
I think it’s c I believe
You might be interested in
Q) Select the two obstacles for data parsing
fgiga [73]

Answer:

A and B

Explanation:

parsing with a rich grammar like TAG faces two main obstacles: low parsing speed and a lot of ambiguous syntactical parses.

3 0
4 years ago
Read 2 more answers
What is security in Technology<br>​
maria [59]

Answer:

IT security is a set of cyber security strategies that prevents unauthorized access to organizational assets such as computers, networks, and data.

3 0
4 years ago
Read 2 more answers
Select the correct answer. Which sign or symbol will you use to lock cells for absolute cell reference?
worty [1.4K]

Answer:

A. ampersand

Explanation:

7 0
3 years ago
Read 2 more answers
Now, we’re ready to program! Leave the visualizer and go back to https://repl.it/ to write your program. Here is the pseudocode
svlad2 [7]

Answer:

here

Explanation:

6 0
3 years ago
When are computers most vulnerable to threats or damage?
valentinak56 [21]
With virus protection
8 0
4 years ago
Other questions:
  • What's a good show to watch on Netflix?
    7·1 answer
  • Why is RAM used for temporary storage!
    6·1 answer
  • Raul converts numbers in base 10 to base 2. Which answer best defends why Raul would need to do this?
    12·1 answer
  • Question 15 of 28 (1 point) Jump to Question: Among many other responsibilities, a competent person is responsible for: A. All o
    6·1 answer
  • A user has connected a USB 3.0 device to a computer using a 3 ft (1m) USB 3.0 cable. However, instead of an expected data transf
    9·1 answer
  • A teacher determines student percentages in a course as the points a student earns divided by the total points available in the
    9·1 answer
  • Which of the following activities would be best-suited for a thinking mind map?
    10·2 answers
  • What would be an ideal scenario for using edge computing solutions? a regional sales report uploaded to a central server once a
    14·1 answer
  • Explain the importance of technology in at least 100 words
    11·1 answer
  • Mention three types of pipeline hazards​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!