1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masya89 [10]
3 years ago
9

Which type of relationship is responsible for teaching you values and how to communicate?

Computers and Technology
1 answer:
Fofino [41]3 years ago
8 0
Answer:

its either b or d

explanation:

You might be interested in
F1: 2^14 formula ....................................................................
QveST [7]

Answer:

=POWER(2,14)

Explanation:

The complete question is to write the given formula in cell F1

We have:

F1 = 2^\wedge {14}

The above formula implies 2 raised to the power of 14.

In Excel, this can be achieved using the power function

And the syntax is:

=POWER(m,n)

which means m^n

So, 2^14 will be entered in cell F1 as:

=POWER(2,14)

4 0
3 years ago
To set up a slide show you should do all of the following except ______.
Harlamova29_29 [7]
To set up a slide show you should do all of the following except exit without saving
5 0
4 years ago
Write a function PrintShampooInstructions(), with int parameter numCycles, and void return type. If numCycles is less than 1, pr
PSYCHO15rus [73]

// Writing a C++ function

void PrintShampooInstructions(int numCycles){

if(numCycles < 1) // if  condition stands

cout<< "To few";

else if(numCycles >4)

cour<<"Too Many";

else{

// looping the variable for desired out put

for(int i=0;i<numCycles;i++)

cout<<i<<":"<<" Lather and rinse."<<endl;

}

}

6 0
3 years ago
Read 2 more answers
todd’s manager had asked him to write a report on ways to increase safety in the warehouse Todda you to Internet to research sta
wariber [46]
<span>The answer is : He likely did not cite his research, and committed plagiarism.  </span>Todd's manager has asked him to write a report on ways to increase safety in the warehouse. Todd used the Internet to research statistics and recommendations for improving safety in the workplace. He feels like he pulled together a really strong document and that his manager will be pleased. However, when he is called into his manager's office, his manager is concerned and tells him that he has been unethical in his work.  He likely did not cite his research, and committed plagiarism.   It is <span>the practice of taking someone else's work or ideas and passing them off as one's own.</span>

5 0
3 years ago
Read 2 more answers
Explain the pros and cons of touchscreen, non-touchscreen, and hybrid devices:
allochka39001 [22]

Answer:The customer reviews of touchscreen laptops like the Lenovo Ideapad 3 Laptop show that it allows faster navigation. It is based on touch-screen technology that improves the functionality of your computer. This allows you to perform tasks that are difficult to do on a traditional laptop. It is easy to use and you can operate it without requiring any additional attachment.

Explanation:

A touch screen laptop is easier to use, fun to navigate, and comes in sleeker models. The non-touch laptop is a traditional laptop variant that takes input from the built-in touchpad and keyboard. Both the laptops are similar in many aspects. At first, the touchscreen feature was only available in high-end business laptops, but now you can buy a touch screen laptop at an affordable price. In this blog, we compare Touch Screen Vs Non-Touch Laptops and help you understand their advantages and disadvantages.

4 0
2 years ago
Other questions:
  • _____ provide the standards, syntax, statements, and instructions for writing computer software
    14·1 answer
  • Two positive outcomes generally associated with modern computing are greater _____.
    12·2 answers
  • What is computer hacking? describe some examples
    6·1 answer
  • Which statement below is not true of EFS
    7·2 answers
  • An AM index between 0 and 1 indicates what? a. the AM signal is very small and will not be detected by the receiver b. distortio
    12·1 answer
  • How can you prevent your VMs receiving DHCP server messages from unauthorized virtual machine pretending to be DHCP servers?
    13·1 answer
  • The Python print function
    9·1 answer
  • The rules on the Internet for how messages are addressed and passed on are called ____ .
    15·1 answer
  • You have used loops for repetitive processes.
    11·1 answer
  • What is 1 st genaration of computer ​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!