1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadya [2.5K]
2 years ago
7

Choose the algorithms below that are also programs.

Computers and Technology
1 answer:
Dmitry [639]2 years ago
7 0

Answer:

pretty sure only Microsoft word

You might be interested in
PLEASE GET THE RIGHT ANSWERS AND HELP MEEE
Afina-wow [57]

Answer: #1 is A

Explanation: Parents often monitor what their child is doing online because online activities can be threatening and sometimes dangerous to a child's life, depending on what they come across on the web. just a hunch

4 0
3 years ago
Read 2 more answers
An empty frame used to reserve space for a picture to be inserted at a later time is know as what
Anarel [89]

Answer:

placeholder

Explanation:

4 0
3 years ago
During the conflict resolution process, which of the followings statements would be appropriate when defining the problem?
Mrac [35]
Maybe d




Idk for sure









6 0
3 years ago
Read 2 more answers
Hola buenas tardes, mi problema es el siguiente, en Word quiero alinear los párrafos por separado, pero, así lo sombree una line
Rudik [331]


Usa el botón Tab :)

6 0
2 years ago
Why the internet is not policed​
trapecia [35]

Answer:

The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work

4 0
3 years ago
Other questions:
  • When saving a file, you must provide a valid file name that adheres to specific rules, referred to as _______________.
    5·1 answer
  • Which of the following refers to special eyeglasses from Google that provide the user with visual information directly in front
    5·1 answer
  • Long distances are usually measured in kilometers.<br> T or F?
    8·1 answer
  • Do applications need to exchange udp control messages before exchanging data
    11·1 answer
  • Which ipv6 header field is known as the priority field?
    10·2 answers
  • - If we place records from different tables in adjacent____________, it would increase efficiency of a database.
    14·1 answer
  • A technician has just installed a video card in a PC. The video card is not working, althoughit was working fine on the test ben
    6·1 answer
  • Kathleen has written this paragraph:
    7·2 answers
  • What instructions would a computer have the hardest time completing correctly
    12·1 answer
  • Difference between Data and information​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!