1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikki [24]
2 years ago
14

See if you can do better then I did

Computers and Technology
1 answer:
never [62]2 years ago
8 0

Answer:

no i can't do better ggs

Explanation:

im not smart (also I did answer the question ;) )

You might be interested in
What is the interface of an app?
Darina [25.2K]

Explanation:

An application interface or user interface ,is the set of features an application provides so that user may supply input to and recieve output from,the program.

3 0
3 years ago
User-system interaction is?
Mandarinka [93]
A multidisciplinary, post-Master<span> educational program which provides practical training in the field of </span>human-computer interaction and user interface design<span>.</span>
8 0
3 years ago
You plan to use the Fill Down feature on a formula in Excel and need to keep a cell reference the same. Which format allows you
Drupady [299]
The answer would be B. $E$19 would keep the cell and row the same.
5 0
3 years ago
Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string
nika2105 [10]

Answer:

The encoding algorithm looks for pairs of characters that appear in the string more than once and replaces each instance of that pair with a corresponding character that does not appear in the string. ... Byte pair encoding is an example of a lossy transformation because it discards some of the data in the original string.

Explanation:

hope it helps!!

6 0
3 years ago
On tool hackers use to get sensitive information from victims is/are:
Feliz [49]
Pretty sure it’s keyloggers because it’s the only one that makes sense to me but I’m not 100% sure on that one
5 0
3 years ago
Read 2 more answers
Other questions:
  • Marie uses a browser to visit a blog. What is the unique identifier of the blog? A. web page B. website C. web address D. email
    7·2 answers
  • In Modern operating system, the __ feature has dramatically improved user productivity.
    11·1 answer
  • Match the installation type to its description.
    9·1 answer
  • Java supports ________; collections of related methods that typically enable you to tell objects what to do, but not how to do i
    12·1 answer
  • Complete the implementation of the following methods:__init__hasNext()next()getFirstToken()getNextToken()nextChar()skipWhiteSpac
    11·1 answer
  • Which of the following is true of operations within a spreadsheet program’s built-in functions?
    15·2 answers
  • ABC IF U HAVE A LEGENDARY PET ON ADOPT ME OR ANYTHING COOL!! &lt;3
    5·2 answers
  • Keyshia wants to add movement to her PowerPoint presentation. Which tab should she use to complete this task
    15·2 answers
  • Any my hero academia fans out there don't report at all just what more friends to
    14·2 answers
  • Capstone Project part 11 quiz
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!