1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nalin [4]
3 years ago
11

Fwee Pwoints Fwor You

Computers and Technology
2 answers:
stealth61 [152]3 years ago
5 0

well why thank you for the points

lina2011 [118]3 years ago
3 0

Answer:

Fre.e Poi...nts Fo..r Yo....u

Explanation:

You might be interested in
5. Robotics deals with the design, construction, operation, and use of robots, as well as computer systems for their control, se
Law Incorporation [45]

The answer would be

True

3 0
3 years ago
Process redesign and reengineering in 1500 words
timama [110]

Answer:

Process re-design is the process in which re-work is done to achieve the improvement in the output. The major aim is to set the goals for achieving the main objective.

The various essential steps in the process of re-design are:

  • Data capturing process are used to identify the process and making the necessary changes.
  • Identify every step of the process to ensure that process is in organized way along with the workflow.

Re-engineering is the process of re-design the system with focuses to improve the efficiency and quality. It basically analysis the whole business re-engineering process. The main step is to identify the need for the changes.

 

7 0
3 years ago
I really need the answer now!!
guajiro [1.7K]

Answer:

3. B.

4. B.

5. B.

6. C.

7. D.

8. C.

9. C.

10. D.

Explanation:

I hope I helped you.

4 0
2 years ago
Selecting the Tiled windows arrangement option places the windows in a(n) _______ pattern on the screen.
Archy [21]

Answer:

Selecting the Tiled windows arrangement option places the windows in a(n) Grid pattern on the screen.

Explanation:

3 0
2 years ago
Write a report on the recent online tuition
ale4655 [162]

Answer:

dgvhgfh

Explanation:

fghdfgh

8 0
3 years ago
Other questions:
  • There are ways to perform computer commands quickly and multiple times. <br> a. True <br> b. False
    11·2 answers
  • A firewall, when properly implemented, can prevent most attacks on your system.
    11·1 answer
  • Fill in the blanks. The ________________ donut chart shows the distribution across your website’s pages by the number of clicks
    14·1 answer
  • Query " frosty the snowman
    8·1 answer
  • Are the buying and selling of stocks centralized activities? Why or why not?
    10·2 answers
  • pDevices used to prevent data from being written to a disk can connect to a computer through FireWire, SATA, PATA, and SCSI cont
    10·1 answer
  • A(n) ____ consists of a series of related instructions, organized for a common purpose, that tells the computer what tasks to pe
    6·1 answer
  • Which three techniques are used in this photo
    12·1 answer
  • ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag
    6·1 answer
  • __________ is a Microsoft software development tool that developers can use to write multimedia applications
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!