1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nydimaria [60]
2 years ago
8

There are dash types of symbols

Computers and Technology
1 answer:
Ostrovityanka [42]2 years ago
3 0

Answer:

logo , pictogram, ideogram, icon, rebus, phonogram and typogram

Explanation:

they are forty symbols

You might be interested in
Which browser folder contains previously viewed web pages?
Arlecino [84]
<span>The history browser folder contains previously viewed web pages. This folder </span>stores the URLs of sites you have accessed within a defined period of time, which means you can see your browsing history.
<span> You can choose how you want to view the history by selecting a filter from the menu on the history tab.</span>
6 0
3 years ago
Match the term to its correct defintion
emmasim [6.3K]

Answer:

View Base tables: Virtual table based on a SELECT query

CREATE VIEW statement: Data definition command that stores the query specification in the data dictionary

DROP VIEW statement: Data definition command that removes the query specification in the data dictionary

Explanation:

Views are virtual tables, which can be created by select queries using the real database tables.

Creating and dropping views can be done by the CREATE VIEW and DROP VIEW statements.

<u>CREATE VIEW syntax:</u>

CREATE VIEW view_name AS

SELECT column1, column2, ...

FROM table_name

WHERE condition;

<u>DROP VIEW syntax:</u>

DROP VIEW view_name;

5 0
3 years ago
Unused neural connections in the brain are reduced through a process of
OLEGan [10]

Answer:

Pruning or remodeling

Explanation:

The brain is the major control system of animals. It acts just like the processor in a computer system. Brain development starts before childbirth and progresses to adulthood.

During the first few year of life, the neural and synapse connection multiply by millions, when the brain is mature enough, the brain begins to cut off connections of synapses, neurons and axons that are not used through the process called pruning or remodeling, which is very vital for brain development.

6 0
3 years ago
The good example of pivoting is changing thedimensions along the axis.? True? False
ollegr [7]

Answer:

False

Explanation:

The good example of pivoting is NOT changing the dimensions along the axis.

5 0
3 years ago
Browsers often store the cookies in individual files, each named for the server that owns the cookie. Whenever the browser visit
Anna11 [10]

Answer:

The answer is TRUE.

Explanation:

Cookies in browsers are like identification criteria. It contains unique data to a specific user. The use of this is to ensure that servers or websites that you have visited previously will recognize you as the same user who has been there before. This will cause the data and website information to load faster that before.  

Think of it as your school's gate. The security guard is the browser. He will let you inside the campus without question since he has seen your school ID or has recognize you as a student of the school.  

Cookies come in various types such as:

  • Authentication cookies - most common type of cookies that websites used to recognize you as the user who has been there or logged in before.
  • Persistent cookies - cookies that can be used for long term. Sometimes, you will encounter websites that allows the user to remember his log in credentials, this is the type of cookies that these websites used. Often, these cookies are willingly enabled by users.
  • Session cookies - cookies with expiration or being stored temporarily. These cookies will be terminated once the browser is closed.
  • Third-party cookies - These are additional cookies being added by the website you are using. But these cookies are not owned by the website itself, but is being used by other websites to track down your activities to make you see and experience advertisements that are catered to you. These are mostly exposing threats.
8 0
3 years ago
Read 2 more answers
Other questions:
  • PLEASE HURRY
    6·1 answer
  • 4. Extrusion tools in Blender® duplicate vertices while keeping the geometry connected with the original vertices. (1 point)
    7·1 answer
  • Read the scenario below. Explain why this is not fair use of copyright materials. What should you do instead of using the entire
    10·1 answer
  • if you want to exclude a portion of an image which option should be chosen?? A. Arrange B. Position C. Crop D. Delete
    5·1 answer
  • Describing light years
    7·1 answer
  • 2.3.4 CodeHS HTML Word Definitions
    10·1 answer
  • Write a program that lets a maker of chips and salsa keep track of sales for five different types of salsa: mild, medium, sweet,
    14·1 answer
  • What will be the index of leaf node in a right-skewd binary tree with height =7,where every parent has at most one child?​
    15·1 answer
  • Dispositivo de computo
    5·1 answer
  • If you can photoshop please text me i need help for my digital media class 7862381441
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!