1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dima020 [189]
3 years ago
12

Help!!!!!!!!!!!!!!!!!!!

Computers and Technology
1 answer:
Natalka [10]3 years ago
4 0
1. A   2.B hope you pass the test
You might be interested in
True or false
ICE Princess25 [194]
1. True
2. Usually true, but it depends on the search engine you're using.  For example, Google lets you search for several words without commas.
3 0
3 years ago
3 things you will do while driving
tino4ka555 [31]

Umm..let’s see hold the steering week look at the road and look on my phone for directions

4 0
3 years ago
____ files involves combining two or more files while maintaining the sequential order of the records.
zysi [14]

Merging files involves combining two or more files while maintaining the sequential order of the records.

<h3>What is Merging files?</h3>

Merging is known to be the act of of taking two or a lot of groups of data in the method of a file or folder, and adding them together into a single file or folder,

There are different kinds of files that exists. A computer file is one that comes in different format and sizes as well as its function. To merge connote to put two or more things together.

Note that, Merging files involves combining two or more files while maintaining the sequential order of the records.

Learn more about Merging files from

brainly.com/question/1206838

#SPJ1

6 0
2 years ago
For some points bc I’m nice like that.
Marysya12 [62]

Answer:

I'd say Gary the snail. He has so much personality in such few words.

Explanation:

He's a god

4 0
3 years ago
Read 2 more answers
The Telecommunications, Network, and Internet Security domain of information security is also concerned with the prevention and
MA_775_DIABLO [31]

Answer:

The answer is "Option C".

Explanation:

In the Information Security, the area of telecom, channel, and internet security often covers and provides the protection, which is an identification of system misuse that poses a threat to safety, privacy, and availability, and wrong option can be described as follows:

  • In option A, It defines the essential details and also reduces the influence of continuous culture.
  • In option B, It provides access to authorized people.
  • In option D, It is a part of the account sections.
7 0
3 years ago
Other questions:
  • You just realized the turn signal on your vehicle is broken,
    15·1 answer
  • What technical elements can a film director manipulate to achieve the final product, conveying his ideology and vision?
    11·1 answer
  • Alessandro wants to use his desktop computer to video chat with his mother. What hardware does he need to accomplish this?
    9·1 answer
  • You need to deploy a new cloud-based windows intune deployment to manage mobile devices in your organization. drag and drop the
    5·1 answer
  • Why would you group data in a report? SQL
    9·1 answer
  • Writa function to read content from "Zone. txt" and write it into another file "zone1. txt" by reversing each line if the line s
    15·1 answer
  • Define ethical (include a link to the source of definition). Describe the ethical dilemma (issue) in this scenario.
    12·1 answer
  • Me pueden decir todo lo que sepan sobre las redes informáticas porfa? De preferencia que sea algo largo
    12·1 answer
  • Any computer expert to help me answer this question plz am giving brainliest
    11·1 answer
  • What is computer hardware / software​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!