1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fittoniya [83]
3 years ago
13

What medium allows for electronic delivery of DTP content without the need for any physical media?

Computers and Technology
1 answer:
Lostsunrise [7]3 years ago
0 0
Email? Dropbox?...Not sure give one of these a try? Hope this helps
You might be interested in
What two skills are most important for a meteorologist
Komok [63]

being able to find out the weather.


being able to wear fancy suits.

7 0
3 years ago
Read 2 more answers
A(n) __________ can include a computer's full operating system, applications, and system settings, including security and config
babymother [125]

Solution:

It is done by Operating system.

An Operating system is system software that manages computer hardware and software resources and provides common services for computer programs.

Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources.

For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes system calls to an OS function or is interrupted by it. Operating systems are found on many devices that contain a computer – from cellular phones and video game consoles to web servers and supercomputers.


5 0
3 years ago
Please help I I decided to screen shot something in my laptop but now my screen isn’t working or moving can you give me a way to
ehidna [41]

Answer:

Just restart it. It would definitely work.

6 0
3 years ago
Read 2 more answers
A website sells illegal and counterfeited materials. According to which law can the US Attorney General seek a court order to re
RideAnS [48]
The answer is SOPA or Stop Online Piracy Act. This bill was introduced by Lamar Smith a representative in US. Lamar passed this bill in the United states to enforce the law to combat online copyright, online trafficking, and other cyber crimes. There are many provisions on this bill including the court orders to request ISP (Internet Service Provided) to block access to that website.
3 0
3 years ago
Read 2 more answers
If you store a binary tree in an array the index of the right child and the left child is computed by _______
Fiesta28 [93]

Answer:

left child = 2 index +1 & right child = 2 index + 2

Please Mark Brainliest If This Helped!

3 0
3 years ago
Other questions:
  • What is returned by the code: range (5, 100, 25) ?
    7·2 answers
  • HELP NOW PLZZ/ Question: Complete the sentence with the correct response.
    11·1 answer
  • Give me give me keyboard on this phone please provide nice I can't type where is the keyboard.Give me give me keyboard on this p
    6·2 answers
  • Which of the preventive strategies is described below: Violence often escalates. Behaviors like excessive complaing, hostility,
    10·1 answer
  • IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally,
    11·1 answer
  • When developing e-business systems, an in-house solution usually requires a ____ for a company that must adapt quickly in a dyna
    11·1 answer
  • You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user
    5·1 answer
  • In 3-5 sentences describe whether or not files should be deleted from your computer explain your answer
    12·1 answer
  • 4. Give four reasons why a laptop computer is more expensive than a desktop computer of the
    10·1 answer
  • How can you prevent someone with access to a mobile phone from circumventing access controls for the entire device
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!