1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
topjm [15]
3 years ago
13

Can u please answer this​

Computers and Technology
2 answers:
antoniya [11.8K]3 years ago
8 0

Answer to your question is given in the attachment

<h3>PLEASE MARK ME AS BRAINLIEST </h3>

I don't know the answer of 2 and 3

Sorry for that :(

Ivanshal [37]3 years ago
5 0

Answer:

this worksheet can be found online

Explanation:

You might be interested in
Why should you avoid the use of sarcasm, clichés, and idioms in business letters?
Alex

You should avoid those types of writing because it doesn't make you look like you are a professional.


hope this helps!

8 0
3 years ago
Read 2 more answers
Query " frosty the snowman
julsineya [31]
I don't think that is a query...
5 0
3 years ago
What are the two reasons we analyze algorithims
fredd [130]

The reason for analyzing an algorithm is to discover its characteristics in order to evaluate its suitability for various applications are compared with other algorithms for the same application

4 0
3 years ago
Your new client's AdWords account has one campaign with one ad group that contains a list of hundreds of keywords. Which best pr
Degger [83]
<span>Create new ad groups with related keywords grouped together</span>
8 0
3 years ago
Wireshark capture files, like the DemoCapturepcap file found in this lab, have a __________ extension, which stands for packet c
VashaNatasha [74]

Answer:

Option (d) is correct

Explanation:

Previously saved capture files can be read using Wireshark. For this, select the File then open the menu. Then Wireshark will pop up the “File Open” dialog box.

Wireshark capture files, like the DemoCapturepcap file found in this lab, have a .pcapng extension, which stands for packet capture, next generation.

5 0
3 years ago
Other questions:
  • In a mission critical environment, performing maintenance operations on a host FIRST requires which of the following?
    6·1 answer
  • 3.
    13·1 answer
  • 1.using synonyms can help make ur writing more________
    11·1 answer
  • A ___________ is similar to Computer Integrated Manufacturing, but is based much more on standard reusable application software
    5·1 answer
  • Shelly tells a friend that her computer needs to be fixed because it has been producing a lot of heat and is smoking. Where is t
    10·1 answer
  • Name two ways you can identify the pid number of the login shell.
    13·1 answer
  • When is 1600 plus 25 and 1700 minus 35 the same thing?​
    10·1 answer
  • Var1 = 1<br> var2 = 2<br> var3 = "3"<br> print(var1 + var2 + var3)
    5·1 answer
  • Which of the following is NOT a possible combination of values of the variables in this program when it finishes running?
    6·2 answers
  • The three main objectives of information security are
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!