1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
morpeh [17]
2 years ago
9

In the application development area, ____________ often refers to bringing together various sources of data to create a new prod

uct with unique value.
Computers and Technology
1 answer:
Vinvika [58]2 years ago
8 0

Answer:

mashup

Explanation:

In the application development area, mashup often refers to bringing together various sources of data to create a new product with unique value.

You might be interested in
Wamna play mm2<br><br><br>imma send u my username​
SashulF [63]

Answer:

sure send it lol but how

6 0
3 years ago
There are 2048bytes in4megabytes true or false​
ollegr [7]

Answer:

Explanation:

bonjour,

1 MB =  1 000 000 B (bytes)

4 MB = 4 000 000B

=> false

5 0
3 years ago
¿Cuáles son los 5 Procesadores de textos on line más usados?
labwork [276]

Answer:

5 Procesadores de textos

Explanation:

Google Docs.

Textilus - Edición Microsoft Word.

TextEdit.

Kingsoft Office Writer.

Páginas.

8 0
3 years ago
It is ok to sell services on Xbox in exchange for real-world money
Sati [7]
Is this a true or false question? If it is let me know and I can help! (:
6 0
3 years ago
Read 2 more answers
A(n) ________ virus runs a program that searches for common types of data files, compresses them, and makes them unusable.
ad-work [718]

Answer:

encryption

Explanation:

A(n) encryption   virus runs a program that searches for common types of data files, compresses them, and makes them unusable.

5 0
3 years ago
Other questions:
  • Which of the following is a template definition?
    5·1 answer
  • …………………..is made upof plastic or glass fibers that transmit data at very fastspeeds.
    10·1 answer
  • The identification of critical information is a key part of the OPSEC process because: a) It is required by the JTF commander to
    13·1 answer
  • If you see ##### in a cell, you should
    10·1 answer
  • Suppose that your application uses a loop that isn't producing the intended results. The best way to analyze what’s going on in
    13·1 answer
  • J. A computer on a network that acts as the central storage location for
    5·1 answer
  • Powerful IT security systems are needed to defend against what appears to be authorized access to a network or application. Sele
    6·1 answer
  • Which is a sentence fragment?
    6·1 answer
  • What does a file association specify?
    10·2 answers
  • in your own ideas what are the disadvantages of participating in a videoconference write your answer inside the circle​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!