1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
3 years ago
15

I need some questions and answers in spreadsheet​

Computers and Technology
1 answer:
yarga [219]3 years ago
5 0

Answer:

you need to show what you need help with

Explanation:

You might be interested in
Technician A says that reprogramming a PCM using the J2534 system requires a factory scan tool, while Technician B says it requi
Dmitry [639]

Answer:

Technician B only

Explanation:

6 0
3 years ago
An automated search feature used by search engines to find that match your search terms is called a spider or
9966 [12]

Answer

Crawler

Explanation

This is a program that go to various website to read their pages and content provided in order to form entries for a search engine index.All search engines have this program called spider or a bot. It acts as an automated script that browses through the internet to scan the web pages and find words contained in the pages and where the words are used.


5 0
3 years ago
Read 2 more answers
How to construct a 112.5 degree angle?
worty [1.4K]
You can construct it with a protractor. 
7 0
3 years ago
Name the types of computer used in hospital for computer​
disa [49]

Answer: These are all the computers they use All.

All In One Computers.

Medical Grade Computers.

Medical Tablets.

Medical Box PCs.

Medical Box PCs.

Displays & Monitors.

Medical Grade Monitors.

5 0
3 years ago
The ____________ protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms
strojnjashka [21]

The answer in the space provided is the Diffie-Hellman Key Exchange. This is entitled to be the first published key algorithm in which has a limit in which the exchange occurs in secret values and that its purpose was to enable two users to have an exchange of key in a secure manner in means of using it for a subsequent symmetric encryption in terms of messages.

7 0
3 years ago
Other questions:
  • What is master slide and tell about master slide
    6·1 answer
  • ​In addition to joint application development, another popular user-oriented method is _____, which resembles a condensed versio
    14·1 answer
  • Explain the history of computing of mechanical era
    14·2 answers
  • How does form get its power natural gas
    14·1 answer
  • Why is charles babbage known as father of computer?​
    10·1 answer
  • What is the working principle of computer?​
    10·1 answer
  • Who invented slide Rule and when?​
    7·2 answers
  • What is output if month = 11 and day = 14?
    13·2 answers
  • Help Me<br><br> What are the four types of graphic models?
    10·1 answer
  • Which type of evaluation requires that the program be fully implemented before the evaluation can begin
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!