1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
2 years ago
5

DERECTIONS: Identify all the computer software that you need for the following entrepreneurial activities. Refer your answer fro

m the items in the box below. Write your answer in your TLE CSS Activity notebook
Please
I really need an answer
I need help​

Computers and Technology
1 answer:
Rina8888 [55]2 years ago
7 0

Answer:

1

Explanation:

You might be interested in
Into which of these files would you paste copied information to create an integrated document? A. Mailing list B. Source C. Data
viva [34]

it would be b.mailing list


5 0
3 years ago
Read 2 more answers
Early photographers take to work with what in order to produce photographs? (Btw this is photography, it just isn't a subject in
Kruka [31]
1, they used to use chemicals.
4 0
3 years ago
Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect
suter [353]

Answer:

Airplane mode has been set on the tablet.

Explanation:

Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect to the internet even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworker's hotspot but is still unable to connect to the internet.

This is because the Airplane mode has been set on the tablet.

5 0
3 years ago
Why would a network administrator want to filter certain ports when capturing data such as FTP traffic
hjlf

Answer:

To avoid receiving malware-infected files like spam.

Explanation:

Hackers use malware to gain unauthorized access to company files and information for personal gain. Files infected by the malware can infect other systems or files. There are various types of malware namely; virus, trojan horse, worm, spyware, ransomware, adware etc.

5 0
2 years ago
Can you help please ill give branilist
konstantin123 [22]

HTML uses tags to help the computer know what different pieces of content in the web page actually are. Right now we've only learned how to tell the computer that some text is a paragraph, or that part of your website is the body. We've already seen how that affects the way our web pages look and are structured.

(I don't know how it should be organized, but hope this helped)

3 0
2 years ago
Other questions:
  • Janeal spends her day looking at the stock and bond markets and evaluating how the portfolios of the businesses she serves will
    5·1 answer
  • If you want to copy text formatting from one area of your document to another area, _____.
    5·2 answers
  • The main parts of a lever are the....
    6·2 answers
  • Which icon is greater in file size? (Show your working)
    8·1 answer
  • What is application software used for
    13·1 answer
  • While (e &lt; 10):<br> print (c)
    10·1 answer
  • The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a select
    10·1 answer
  • FFFFFFFFFRRRRRRRRRRRRRRRRRREEEEEEEEEEEEEEEEEEEEEEE
    10·2 answers
  • Which of the following would most likely be the target audience for a product
    7·2 answers
  • Neview of related literature happens in two wayo (1) Traditional and
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!