1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina CMI [18]
4 years ago
13

Instructions:Select the correct answer.

Computers and Technology
1 answer:
Dafna1 [17]4 years ago
8 0
It would be a audio file -B.
You might be interested in
How does and employer judge a candidate
nlexa [21]

Answer:

Explanation:

An employer can judge a candidate from these factors.

1) Confidence Level

2) Way of talking

3) Written or screening test

4) Experience Level

5) Resume

6 0
3 years ago
What do the blocks in the looks category do?
mart [117]

Answer:

if u have a question can I see it

Explanation:

so I can know the answer choose

6 0
3 years ago
Icons for the most commonly used applications on a Mac can be found here. Dock Menu bar Toolbar Toolbox
Kazeer [188]

What do you mean please reply to this comment with a question.

4 0
4 years ago
Read 2 more answers
True or false while the internet and social media are vital for spreading campaign messages, television advertisements are consi
liq [111]
Salutations!

The answer is false. Social media, internet, television, are all effective to spread campaigns, news etc. This is the easiest and the fastest way to get information. All these sources are very strong and can reach information any where in the world within minutes.

Hope I helped (:

have a great day!
7 0
4 years ago
Derek’s supervisor is concerned that the company’s security system does not comply with the new standards the company has decide
miv72 [106K]

Answer:

Access Control List is the correct answer to the following question.

Explanation:

The following answer is correct because by the ACL we can access and refusal of services that is controlled. It used to filter traffic for the network and it also used give the extra securities to protect the network. AVL provides an authorization attached to the object that define which persons are allowed for access to the object and operations.

8 0
3 years ago
Other questions:
  • Respond to the following in 2-5 paragraphs. Give an example of how you can demonstrate active listening.
    12·1 answer
  • ________-generation languages use symbols and commands to help programmers tell the computer what to do.
    11·2 answers
  • Use the following data definitions data myBytes BYTE 10h,20h,30h,40h myWords WORD 3 DUP(?),2000h myString BYTE "ABCDE" What will
    9·1 answer
  • In this assignment, you will write a complete C program that will act as a simplecommand-line interpreter (i.e., a shell) for th
    12·1 answer
  • Anyone wanna play Bloons tower defense 5 im rank 52
    5·2 answers
  • What is the best prediction she could make about this
    15·2 answers
  • Outline 3 computer system problem that could harm people and propose the way avoid the problem​
    12·1 answer
  • . What process skill would a scientist use to find the length of a line
    5·1 answer
  • Which type of database program is Microsoft Access 2016?
    7·2 answers
  • What message did vera mukhina convey in her work entitled the worker and the collective farmworker?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!