1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga55 [171]
2 years ago
8

Sukant's professor asks her to take over his online class while he is away because she is an effective digital communicator.

Computers and Technology
2 answers:
Ne4ueva [31]2 years ago
7 0
The answers are a, b, and e.
Otrada [13]2 years ago
6 0

Answer:

b is the right answer. she posts messages that avoid slang and text language

You might be interested in
Unscramble thr words <br>1.Nsieg Wiev<br>2.Seeathdat ievw​
valentinak56 [21]

Answer: genis view       headset view

Explanation:

6 0
3 years ago
Read 2 more answers
All of these valid ways to earn money in microworkers except
vovikov84 [41]

Answer:

yes u are trus

Explanation:

mark me as brainliest hehe

8 0
3 years ago
Select the correct answer from each drop-down menu. Select the correct type of address reference.
Reika [66]

<u><em>[ Absolute ]</em></u><em> Addresses do not change if you copy them to a different cell.</em>

<u><em>[ Relative ]</em></u><em> </em><em>Addresses change depending on the cells you copy them to.</em>

8 0
3 years ago
Read 2 more answers
Meteoroids are small space rocks. They are usually pieces of asteroids or comets. Meteoroids orbit the sun like asteroids and co
Angelina_Jolie [31]
B is your answer meteoroids are small space rocks they are usually pieces of asteroids or comets
4 0
2 years ago
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
Lera25 [3.4K]

Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

<h3>What is Ransom malware?</h3>

This is known to be a kind of  malware that hinders users from gaining in or access to their system or personal files and it is one that often demands ransom payment so as to get access.

Therefore, Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

Learn more about Ransom  malware from

brainly.com/question/27312662

#SPJ12

6 0
2 years ago
Other questions:
  • Unlike a virtual image, a real image
    7·1 answer
  • Describe the Software Development Life Cycle. Describe for each phase of the SDLC how it can be used to create software for an E
    14·1 answer
  • How long will twenty percent of battery life last me?
    14·2 answers
  • __________ use a challenge response mechanism in which a server challenges a user with a number, which a user must then enter in
    5·1 answer
  • Which of the following actions is an example of "window dressing?" a. Using some of the firm’s cash to reduce long-term debt. b.
    13·1 answer
  • Which of the actions below will not create more room on your hard drive?
    11·1 answer
  • Does white space have visual weight? Yes or No
    7·2 answers
  • How many sets of number do both Hex and RGB values have?
    10·1 answer
  • You have many drugs that you want to store electronically along with their purchase dates and prices, what kind of software woul
    7·1 answer
  • The Curiosity Rover has recently landed on Mars and likes to send Twitter updates on its progress. If a tweet is posted 10 minut
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!