1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lianna [129]
3 years ago
7

What new information, strategies, or techniques have you learned that will increase your technology skills? Explain why its impo

rtant to start doing this right away.
Computers and Technology
1 answer:
Minchanka [31]3 years ago
6 0

Taking brakes every hour so your eyes don't start to strain.

You might be interested in
What do you mean by algorithm​
Snowcat [4.5K]

A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

7 0
3 years ago
Read 2 more answers
Which two graphs best represent the motion of an object falling freely?
larisa [96]
The graph would have to be pointing completely down to be falling freely.
4 0
3 years ago
Suppose we are sorting an array of nine integers using heapsort, and we have just finished one of the reheapifications downward.
Ilia_Sergeevich [38]

Answer:

3

Explanation:

Heap sort pick an item from the first or last position in an array and compares it with other items in other positions in the array, swapping position if they meet the condition.

The array above has three maximum items arranged sequentially in the array, this is prove that there have been 3 reheapifications in the array.

7 0
3 years ago
What would be some reasons to change the default page<br> encoding?
madam [21]

Answer:

Synchronization with the document for one reason or another

5 0
3 years ago
Which process passes private and sensitive information to unscrupulous websites through clicks on random links?
QveST [7]

Answer is Phishing

Phishing is fraudulent and it attempts to steal your personal information through unscrupulous websites. A phishing website tries to steal private and sensitive information by tricking the user into believing that he/she is on legitimate website. You could easily land into a phishing website by mistyping a web address. It mainly comes through malicious links attached to an email, IM, or text messages. Do not be duped or fall victim to such links.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which option should you select to ignore all tracked changes in a document
    6·1 answer
  • Which of these symbols is a special character that is accessible only from the Symbol dialog box? A. © B. + C. é D.
    13·2 answers
  • Whenever Jim starts his laptop, he sees some commands and numbers appearing on his screen. These instructions are being processe
    12·2 answers
  • You work in a classified environment where Bell LaPadula MLS (Multilevel Security) model is employed. Your clearance is "SECRET"
    5·1 answer
  • Which of these image sizes takes the most storage space?
    8·2 answers
  • Does coaxial cable use radio waves to transmit data
    10·2 answers
  • Gina wants to consistently format the headings in all of her worksheets.. . Which is a quick way to do so?. A)Format the heading
    10·1 answer
  • Plz plz plz plz plz plz plz plz plz plz plz pl plz plz plz plz plz plz plz plz plz plz plz plz olz plz plz
    14·1 answer
  • To maintain your body temperature, your body converts chemical potential energy into thermal energy T or F
    6·1 answer
  • Why would students most likely need to collect data? Check all that apply
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!