1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fomenos
2 years ago
14

Verbs in the active and passive voice

Computers and Technology
1 answer:
natulia [17]2 years ago
5 0

Answer:

Voice refers to the form of a verb that indicates when a grammatical subject performs the action or is the receiver of the action. When a sentence is written in the active voice, the subject performs the action; in the passive voice, the subject receives the action.

You might be interested in
Urgent help<br> Write a program that prints ‘Hello World’ to the screen
lapo4ka [179]
Class newprog
 { 
      public static void main()
       {

                 System.out.println("Hello world");
              }
}
4 0
3 years ago
Why are coders using encoder software? What are their advantages and disadvantages? And when might a coder need to use the codin
IrinaVladis [17]
<span>Coders using encoder software:
To enhance their productivity</span><span>
Speed and Efficiency
</span><span>Accuracy and consistency
</span>
Encoding is done to reduce the number of bit to be transmitted and save bandwidth .can be fairly complex and contain some delicate parts. This makes them less tolerant of mechanical abuse and restricts their allowable temperature.

<span>including increased productivity, accuracy, and efficiency in coding and the consistent application of coding rules. However, there is a cost to the software, but savings can be seen in other areas.</span>

7 0
2 years ago
WILL GIVEE BRAINLIEST ANSWER!!!!
Licemer1 [7]

Answer:

People have been ringing the death knell for email on and off for a few years now. But should we be listening?

The latest peal came from French IT company Atos, which declared that it would phase out internal emails by 2013. And for reasons we’ll all recongize: too much time spent dealing with too many emails, of which too few are useful and too many are spam. CEO Thierry Breton said his staff would instead use good old face-to-face communication, as well as instant messaging (IM) and social media tools.

3 0
3 years ago
This operating system was used by individual computers and required users to type commands.
In-s [12.5K]

Answer:

MS-DOS is your answer

Explanation:

6 0
3 years ago
Which encryption standard uses Advanced Encryption Standard (AES), a 128-bit block cipher that is much tougher to crack than the
Alchen [17]

Answer:

Wi-Fi Protected Access 2 (WPA2)

Explanation:

The Wi-Fi Protected Access 2 (WPA2) makes some alterations to the encryption algorithm that were used in WPA and WEP to what is known as the  Advanced Encryption Standard (AES). This is a 128-bit block cipher considered to be much more difficult to crack than the usual 128-bit TKIP wrapper. However, although WPA2 offers a much more tougher encryption standard, it is important to note that it is not hack proof.

5 0
3 years ago
Other questions:
  • GenXTech is a growing company that develops gaming applications for military simulations and commercial clients. As part of its
    9·1 answer
  • Explain the difference between general-purpose and specialized applications. Also discuss the common features of application pro
    11·1 answer
  • Identify and explain the three tiers of web-based applications.
    15·1 answer
  • The create_python_script function creates a new python script in the current working directory, adds the line of comments to it
    9·1 answer
  • What is one of the most helpful things about having a role model?
    10·2 answers
  • 2.8 Code Practice: Question 2
    11·1 answer
  • The computer system for a major retail store was hacked. Many addresses, credit card numbers, and other pieces of customers’ per
    7·2 answers
  • The specific instructions that a computing device needs to boot up and control the hardware
    12·1 answer
  • When constructing policies regarding data _______________, it is important that these policies offer particular guidance on sepa
    14·1 answer
  • balance exercises used for introducing balance training should initially involve little joint motion and improve what type of co
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!