1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
user100 [1]
2 years ago
14

Please answer questions in complete sentences!

Computers and Technology
1 answer:
Troyanec [42]2 years ago
7 0

i need help on that too :cc

You might be interested in
What are four different commands in Internet Explorer and identify their keyboard shortcuts
Zigmanuir [339]
<span>Ctrl + Q -  show all tabs
Ctrl + O - open a file
Ctrl + T - Open a New Tab
Ctrl + W -  close a tab

Hope This Helped <3
</span>
6 0
3 years ago
Which of the following resources is an example of a web-based application?
kompoz [17]
The answer will be google docs since it depends on a web and its an application. hope it helps

3 0
3 years ago
A __________ infrastructure is made available to the general public or a large industrygroup and is owned by an organization sel
Amiraneli [1.4K]

\Huge{\fbox{\red{Answer:}}}

A <u>public cloud</u> infrastructure is made available to the general public or a large industrygroup and is owned by an organization selling cloud services.

a. community cloud

b. hybrid cloud

c. public cloud ✔

d. private cloud

5 0
3 years ago
Proszę daje wszystko potrzebuje tego
Stolb23 [73]
I’m sorry I do not speak that
5 0
3 years ago
Read 2 more answers
​Five elements that can prove the genuineness of a user. What you know, what you have, what you are, what you do, and where you
nataly862011 [7]

Authentication factors are the factors that describe about the ingenuition or origination of the user. This is the tag that tells about the actuality of user that is getting connected with internet by the five elementals.

Hope this helps!

8 0
3 years ago
Other questions:
  • Stores of data that are so large or complex that it is difficult to process them using traditional data base management applicat
    5·1 answer
  • The SETI (Search for Extraterrestrial Intelligence) project collected vast amounts of data that needed processing. SETI was one
    14·1 answer
  • Respecting culture in the workplace means understanding that
    5·2 answers
  • If you “bury” a story on Digg, what have you done
    10·1 answer
  • 2. Billys teacher asked him to type a report about asian food. Which paragraph format should he use?
    12·2 answers
  • What is the problem with the code snippet below? public class Test { public static void main(String[] args) { System.out.println
    6·1 answer
  • Gemima wants to order the different kinds of food alphabetically on the table. Which actions should she take? Check all that app
    8·2 answers
  • I have to write this in Java, but i've never even learned it before and i'm completely lost
    12·1 answer
  • With which feature or menu option of a word processing program can you make an image like this?
    14·2 answers
  • After data is collected, how is it analyzed?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!