1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OleMash [197]
2 years ago
6

I'm bad i'm mrs puff doo doo doo yeah it's a holiday

Computers and Technology
2 answers:
stepan [7]2 years ago
8 0

Answer:

uh what do u mean by that?

leonid [27]2 years ago
5 0

panini come and sook my genie

Explanation:

ninja pp

You might be interested in
You have a Bluetooth headset that integrates with your computer so that you can talk to partners through Microsoft Lync. This is
otez555 [7]
I believe this is an example of a Wireless Personal Area Network (WPAN). This type of network provides a low range wireless network that can interconnect devices near each other. So, Bluetooth devices such as a Bluetooth headset would be an example of WPAN.
5 0
3 years ago
Read 2 more answers
Which of the Arts, A/V Technology, and Communication career cluster pathways are involved with producing a product for an audien
PIT_PIT [208]

I believe the pathways are Audio/Visual Technology and Film, Journalism and Broadcasting and Printing Technology .


5 0
3 years ago
Read 2 more answers
To quit, a user types 'q'. To continue, a user types any other key. Which expression evaluates to true if a user should continue
devlian [24]

Answer:

!(key == 'q')

Explanation:

Based on the description, the coded expression that would equate to this would be

!(key == 'q')

This piece of code basically states that "if key pressed is not equal to q", this is because the ! symbol represents "not" in programming. Meaning that whatever value the comparison outputs, it is swapped for the opposite. In this case, the user would press anything other than 'q' to continue, this would make the expression output False, but the ! operator makes it output True instead.

3 0
2 years ago
The analysts at Techno Info Systems are considering the four-model approach to system development for a new client. If they make
Natali [406]

Answer:

Option B is correct.

Explanation:

Within Techno Info Systems the user has been analyst contemplating that four-model concept towards computer development for such its new customer. When they adopt that four-model method, thus the result seems to be the time taken to implement the rises in the method.

So, therefore the other options are incorrect according to the following scenario.

4 0
3 years ago
structured analysis is called a(n) _____ technique because it focuses on processes that transform data into useful information.
zzz [600]

Answer:

Process - centered technique

Explanation:

Process - centered technique -

It is the method , where the useless or waste data is converted to some useful information , is referred to as process - centered technique .

This conversion process requires some activities , like  maintenance/support  , implementation , design , analysis and  planning .

Hence , from the given information of the question,

The correct option is Process - centered technique .

4 0
3 years ago
Other questions:
  • Consider the following scenario: "You are an assistant to the accounting manager for a small company that sells sports equipment
    5·1 answer
  • 5. What would the browser display if the following code were executed in a script?a var product = 0; while ( product <= 25 );
    8·1 answer
  • Safety interlock module operates by monitoring the voltage from the
    7·1 answer
  • A modern information-processing model that views memories as emerging from particular activation patterns within neural networks
    6·1 answer
  • Jeanne writes a song, and Raul wants to perform
    6·2 answers
  • A _____ defines what must take place, not how it will be accomplished.​
    12·1 answer
  • Describe the best way to deal with a difficult co-worker?
    13·2 answers
  • Small data files that are deposited on a user's hard disk when they visit a website are called _______.
    6·2 answers
  • Which option is typically only used when utilizing self joins?
    8·1 answer
  • The three main objectives of information security are.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!