1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s2008m [1.1K]
3 years ago
8

HELP

Computers and Technology
1 answer:
Marrrta [24]3 years ago
8 0
I’m pretty sure the answer is b
You might be interested in
1) The critical path of a network is the A) shortest time path through the network. B) path with the fewest activities. C) path
german

Answer:

D

Explanation:

source

https://hbr.org/1963/09/the-abcs-of-the-critical-path-method

7 0
3 years ago
What happens if you move unencrypted files into an encrypted folder?
mr_godi [17]
The new files become encrypted
6 0
3 years ago
A simulation model includes: a. a description of the components of the system. b. a simulation clock. c. a definition of the sta
zloy xaker [14]

Answer: all of the above

Explanation:

8 0
3 years ago
Your mother wants to purchase a large hard drive for her computer ex you to see what type of dry interphase she has her computer
SpyIntel [72]

That is the SATA or data cable. I have built a computer myself and I have also struggled with cables. SATA cables can connect to almost every type of hard drives.


3 0
3 years ago
You want to verify that the Webpages you create are compliant with an accessibility standard supported by a particular governmen
alexdok [17]

Answer:

Validating the pages with an automated validation tool provided by the government.

Explanation:

If I want to verify that the web pages I developed are compliant with an accessibility standard supported by a particular government.I will validate my web pages with an automated validation tool that is provided by government.

There are automated validation tool available and those are supported by a particular government.

5 0
3 years ago
Other questions:
  • Caroline has been asked to find a standard to guide her company’s choices in implementing information security management system
    13·1 answer
  • A group of users can perform certain operations on a shared workbook. Which option helps them to update and track changes in the
    14·1 answer
  • WILL GIVE  BRAINLIEST!! WILL REPORT TOO....
    13·1 answer
  • In gaming, "rendering" refers to:
    12·2 answers
  • Which virus-infecting components are email messages prone to carry?
    8·2 answers
  • If you have defined a class named SavingsAccount with a public static data member named numberOfAccounts, and created a SavingsA
    7·1 answer
  • Simple example of hybrid computer​
    7·2 answers
  • Yeoo check dis out!!!!!! wait my full vid dont show hol on
    7·2 answers
  • ______ requires that any electronic communication must be backed up and secured with reasonable disaster recovery infrastructure
    6·1 answer
  • How does a file reader know where one line starts and another ends?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!