1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikklg [1K]
3 years ago
9

What does the acronym PECs stand for?​

Computers and Technology
2 answers:
kodGreya [7K]3 years ago
5 0

Answer:

Picture Exchange Communication System

Explanation:

PECS stands for Picture Exchange Communication System

Katarina [22]3 years ago
3 0

Answer:

Picture Exchange Communication System

Explanation:

there

mark me brainliest pls

You might be interested in
Explain the 2 types of network topology ​
Ede4ka [16]

Answer:

Mesh- The mesh topology has a unique network design in which each computer on the network connects to every other.

Tree- Tree topologies have a root node, and all other nodes are connected which forming a hierarchy.

pls mark as brainliest

Explanation:

4 0
3 years ago
What data type would best hold the numeric value?
zaharov [31]

Explanation:

I think option b. integer data type is the suitable answer.

7 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
Kamila [148]

Answer:emphasis

Explanation:

7 0
3 years ago
By incorporating video games into classwork, teachers would help students become more confident decision makers.
dangina [55]

teachers would help students become more confident decision makers.

7 0
4 years ago
Read 2 more answers
Many people in modern society have the notion that hard disks can be searched in an hour and files can be recovered from inciner
atroni [7]

Answer:

The CSI effect.

Explanation:

  • The process of recovering the file or the directory from the hard disks that are  burned by teaming them up to a computer is known as the CSI effect in the hard disk.
  • This term is given by the expertise in the organization and it is used in the modern  society  .The CSI is used for only the hard disk in the computer system.
5 0
4 years ago
Other questions:
  • An “evil twin” in the context of computer security is: a) A virus-laden attachment that looks just like a sincere attachment b)
    5·1 answer
  • Multiply 2.7×10^4 by 6.3×10^6​
    13·2 answers
  • What can an attacker use to capture switch traffic that wouldn't normally be sent to the port the sniffer is attached to?
    5·1 answer
  • How can I unblock Brainly?
    12·2 answers
  • What are the uses of plotters​
    7·2 answers
  • Which of these is an example of input?
    6·1 answer
  • Is this a desktop or a computer, or are they the same thing
    12·1 answer
  • Using only AND, OR and inverter gates to implement the above Boolean equation, how many gates are needed
    8·1 answer
  • What is a survey? plz hel​
    7·2 answers
  • Scott sends his backups to a company that keeps them in a secure vault. What type of backup solution has he implemented?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!