1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pachacha [2.7K]
3 years ago
10

Forgot this website exsited wsp

Computers and Technology
2 answers:
Mariulka [41]3 years ago
5 0

Answer:

no

Explanation:

stiv31 [10]3 years ago
3 0

Answer:

yup and now you do. thanks for the points

You might be interested in
A married man gets a new job in a company. After three months, he meets a younger woman in the finance department and they begin
pav-90 [236]

Answer:

False ( B )

Explanation:

Of  the seven IT  infrastructure domains The USER domain was not at risk because the User Domain is not task with handling the sharing of data or Mutual communication between users in a Typical IT infrastructure.

The domain charged with such responsibility is The LAN domain because the LAN domain is charged with the sharing of information between the USERS and maintaining good mutual communication, and since the relationship has become sour, the sharing of information between the users will suffer the most and it will be at a high risk

5 0
3 years ago
Imagine you are having a conversation about simulation training programs with one of your friends (it is a slow night). You are
Marina86 [1]
I'd simply say that everyone has their own opinions. Some people don't want to experience it in real life because they fear they may mess up. Hence why we have simulations of things, to help people who don't want to experience something in real life and prepare them for when they decide to go out and actually do it.
3 0
4 years ago
If a user has just added a simple triangle shape into a diagram, how can the triangle be adjusted? Check all that apply. by maki
lesantik [10]
The first two make the most sense.
I hope this helps!
7 0
3 years ago
Read 2 more answers
(a) Draw a flow chart to a program that will have a servo arm move based on an input from a distance sensor. The sensor values w
Sveta_85 [38]

Answer:

c

Explanation:

got it right

6 0
3 years ago
Write an algorithm
liq [111]

Answer:Pseudocode & Algorithm Example 1: Write an algorithm to determine a student's final ... Pseudocode & Algorithm Pseudocode: Input a set of 4 marks Calculate their average by ... Information system flowcharts show how data flows from source documents ... Different symbols are used to draw each type of flowchart.

Explanation:

7 0
3 years ago
Other questions:
  • An attempt to exploit a vulnerability of a computer or network component is the definition of ________.
    15·2 answers
  • Assume that we would like to expand the MIPS register file to 128 and keep the size of all other fields as in the original MPIS
    7·2 answers
  • Write a recursive, int-valued method named productOfOdds that accepts an integer array, and the number of elements in the array
    10·1 answer
  • What is the full word of"VPN"?​
    15·2 answers
  • It is ok to sell services on Xbox in exchange for real-world money
    10·2 answers
  • Explain default dictionary in microsoft word​
    9·1 answer
  • If the executives for Office Max LLC, a chain of office supply stores, developed the chain's objectives by asking buyers and sto
    11·1 answer
  • Which print setting enables multiple slides to be printed on one page?
    5·2 answers
  • Select the correct answer.
    11·1 answer
  • ____ is a technology that exists inside another device
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!