1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luden [163]
3 years ago
5

Need help:(!!!! I’ll mark brainliest if correct

Computers and Technology
1 answer:
defon3 years ago
4 0

Answer:

software engineer is the answer

Explanation:

g

You might be interested in
Cookies are to improve the access of internet information. Therefore for the sake of you own privacy and security you should not
lina2011 [118]
The answer is a. True
3 0
3 years ago
Read 2 more answers
Why should characters be avoided in file names
LiRa [457]
To ensure they're translated properly on other operating systems.
7 0
3 years ago
Es el conjunto de manifestaciones materiales, intelectuales y espirituales que distinguen a un pueblo a)Civilización b)Cultura c
GREYUIT [131]

Answer:

a)Civilización

Explanation:

3 0
3 years ago
The insert options button lists formatting options. true or false.
dezoksy [38]
It's true and false depending on what format you  are using.
8 0
3 years ago
Which type of software-generated problems can indicate that a software bug is causing a memory error?
Katena32 [7]
The type of software-generated problems that can indicate that a software bug is causing a memory error are page fault, exception error and general-protection fault. Registry errors show that there are parts of the registry that were written to the faulty parts of the RAM. An erroneous memory count would happen when there is incompatibility in the installation.
3 0
3 years ago
Other questions:
  • A new company is upgrading a media workstation. The computer will be predominantly used for graphic intensive presentations, sli
    13·1 answer
  • The java compiler requires that a source file use the ________ filename extension question 3 options: 1) .class 2) .h 3) .java
    8·1 answer
  • Because public key encryption requires the use of two different keys, it is also known as _____ encryption
    13·1 answer
  • An application is to be written that would allow students to find out their GPA(double) and their total number of credits (an in
    15·1 answer
  • In order to plan George's birthday, his father gave him a list of people who attended his birthday for the last five years. What
    5·1 answer
  • What are the features of a strong résumé? Check all that apply.
    7·1 answer
  • The process of giving the user the result of processing is called
    14·1 answer
  • Which memory can be removed from motherboard? RAM OR ROM?​
    7·1 answer
  • Your customer said that understanding the directions is difficult. This is an aspect of
    6·1 answer
  • The designers of a database typically begin by developing a​ __________ to construct a logical representation of the database be
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!