1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikdorinn [45]
3 years ago
5

An instruction for the computer. Many commands put together to

Computers and Technology
1 answer:
Assoli18 [71]3 years ago
3 0

Answer:

i think its command but not sure

You might be interested in
In designing a database, a database administrator should consider..
AfilCa [17]
He must consider all of these because the database is the foundation and you Will come to a lot of problems later on in the road if the foundation is faulty
8 0
2 years ago
Read 2 more answers
To inspire unit 1 App
Tasya [4]
Is there more to this or ?
5 0
3 years ago
Which statement draws an accurate comparison between social media marketing and conventional marketing? Social media marketing i
wlad13 [49]
I think the best answer would be the last option.  Social media allow customers to express their views while conventional media do not. In social media, the viewers can freely right their comments and testimonials about a product. However, in conventional marketing like advertisements in televisions, the viewers cannot make direct comments to the company.
4 0
3 years ago
The​ ________ is a​ c-shaped structure that curves around the pancreas and stomach
Sever21 [200]
The duodenum is the c-shaped structure that curves around the pancreas and stomach , it is actually the smallest part of the small intestine and joins the stomach to the jejunum <span />
6 0
3 years ago
why might you want to use the send to compressed (zipped) folder command before sending four pictures to a friend via email
IceJOKER [234]

It's easier to send the files that way because you don't have to attach them individually, and then your friend won't have to download them individually - they can just download the zip package and have all four right at their disposal.

6 0
3 years ago
Other questions:
  • How does the team know what to work upon during the iteration
    6·1 answer
  • What is a basic operation of computers
    13·1 answer
  • There are a multitude of items that Cyber Security professionals view as attack vectors but none are more prevalent and exploita
    13·1 answer
  • If you’re paid hourly and work 40 hours in one week how much overtime have you worked? 8 hours none $48 or $80
    9·2 answers
  • • In your response, please include some examples of the three different types of storage.
    11·2 answers
  • If you ping a device, you are using the __________ protocol.
    7·2 answers
  • What are the three main components of a for loop?
    9·1 answer
  • Pls help quick... will mark brainliest...
    15·1 answer
  • Did you know a security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer sy
    11·2 answers
  • What is a program that includes a function parameter capable of doing?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!