1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Firlakuza [10]
3 years ago
14

Erick, who is taking an online course, sent an e-mail to his

Computers and Technology
2 answers:
timurjin [86]3 years ago
7 0

Answer:

C

Explanation:

Took the test on edgenuity, edge 2020 and got it right

erma4kov [3.2K]3 years ago
3 0

Answer:

c

Explanation:

You might be interested in
Plz show working for binary addition. please solve. 11000 + 110101 + 101011​​
IrinaVladis [17]

Answer:

thats would be 222112 <3

Explanation:

t

5 0
3 years ago
Read 2 more answers
What is resource Management in Wireless Communication ? Explain its Advantages?
Brut [27]

Answer:

Resource management is the system level transmission cellular networks and wireless communication.

Explanation:

Wireless communication is the process to continue to the address for faster response time,to the resource management.

Transmission is the provided by that more utilization and wireless resources available,and to discovered data.

Wireless communication system to demand the larger bandwidth and transmission using development to the system.

Wireless communication resources management the larger bandwidth and reliable transmission consumed all the system layer.

Resource management techniques tool are used in a preliminary concepts or mathematical tools,and average limited power battery.

Resource management are they necessary mathematical and fundamental tools are used in wireless communication.

Wireless communication in the provide that wireless industry in a wireless communication.

8 0
3 years ago
You can run a macro by:
oee [108]

Selecting the button assigned

Using the shortcut Keys assigned

Explanation:

By clicking the assigned button one can run a macro and we can assign a short cut key to macro which we created.

So, the two options we can use to run a macro.

7 0
3 years ago
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
Does inline-block means it makes the block element inline?
elena55 [62]

Answer:

The inline-block transforms the element to generate a block of box type which is laid out like an inline box. And in QuirksMode, the inline-block is being placed inline which is on the same line where the other content lies, however, it acts as a block. And the inline-block elements are quite the same as the inline element though you can have the padding as well as the margins that can be added on all the four sides. This is the only difference though, you will have to mention in the CSS code display:inline-block. They are very commonly used to make the horizontal navigation link.

Explanation:

Please check the answer section.

7 0
3 years ago
Other questions:
  • The underline format will underline ____.
    14·1 answer
  • What does this say:<br> √ans
    6·2 answers
  • The internet maybe best compared to what
    11·1 answer
  • What's a sentence with the words trickle and resume in it? they can be in any tense. Thanku​
    5·1 answer
  • why are the ads you might see on tv between 8am and 10am usually not the same ads you would see between 8pm and 10pm?
    12·1 answer
  • Which iteration must have an expression that has a true or false value?
    11·2 answers
  • How to deactivate the brainly account?​
    13·1 answer
  • KDS Company has 3 departments: 1. Dept X 2. Dept Y 3. Dept Z. Design a program that will read as input each department's sales f
    6·1 answer
  • Which two choices are examples of trivial file transfer protocol (tftp) use? (choose two. )
    5·1 answer
  • The _________________ creates international guiding principles for computer forensic examiners.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!