1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fittoniya [83]
3 years ago
5

25 points select 3 options!!!!!!!!!!!!!!!!!!!!!!!!!

Computers and Technology
2 answers:
Veronika [31]3 years ago
5 0

Answer: don't know sorry

Explanation:

larisa86 [58]3 years ago
3 0

Answer:

B,D,E

Don't Trust Me.

You might be interested in
Identify actions to take when establishing a business. Check all of the boxes that apply.
Gekata [30.6K]

Plan for the unexpected

write a solid business plan

Keep lines of communication open

Predict how business is progressing

4 0
3 years ago
Read 2 more answers
Lee purchased a new pc from dell computer's web site. he purchased his product via a(n) ________.
olga55 [171]
A <span>direct distribution channel if I'm not wrong.</span>
4 0
4 years ago
Which of the following does every font that you choose communicate, either on a conscious or subconscious level?
sergeinik [125]
I believe it is b so I will just leave it at that

3 0
4 years ago
Read 2 more answers
Write an expression using Boolean operators that prints "Special number" if special_num is -99, 0, or 44.
gulaghasi [49]

Answer:

special_num = int(input())

if  special_num == -99 or special_num == 0 or special_num == 44:

   print('Special number')

else:

   print('Not special number')

Explanation:

#get input

special_num = int(input())

#if function to evaluate true or false(aka Boolean)

if  special_num == -99 or special_num == 0 or special_num == 44:

#true evaluation

print('Special number')

#false evaluation

print('Not special number')

8 0
3 years ago
What is the definition of a protocol, as it applies to networks?
natulia [17]
AN example would be htt
5 0
4 years ago
Other questions:
  • If people have humility, they don’t tend to see themselves as overly or more important than others. True False
    13·1 answer
  • What is an image that you can apply to another image to add detail and texture?
    6·1 answer
  • What is the absolute pathname of the YUM configuration file? REMEMBER: An absolute pathname begins with a forward slash
    12·1 answer
  • Write a sentinel-controlled while loop that accumulates a set of integer test scores input by the user until negative 99 is ente
    8·1 answer
  • Which steps can you use to open the Reveal Formatting pane?
    5·2 answers
  • How has information technology made piracy possible
    14·1 answer
  • _______For the C programming language, files containing the code you write are named with a file extension of .g. (T/F)
    8·1 answer
  • The __________ is a center of Internet security expertise and is located at the Software Engineering Institute, a federally fund
    5·2 answers
  • What is eight bits of data called?
    13·1 answer
  • PLSS HELP ASAP ILL GIVE BRAINLIES THANKS
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!