1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aloiza [94]
2 years ago
5

I really need the answer now!!

Computers and Technology
1 answer:
guajiro [1.7K]2 years ago
4 0

Answer:

3. B.

4. B.

5. B.

6. C.

7. D.

8. C.

9. C.

10. D.

Explanation:

I hope I helped you.

You might be interested in
Tim is a project manager. He is brainstorming with his team about problems that could arise during the next phase of the project
Grace [21]

Answer:

b.

Explanation:

just took the quiz

8 0
2 years ago
What is the mid-square method?
Rom4ik [11]

Explanation:

Mid-Square Method:-In this method some it takes some digits from the square of a number.This number is a random number.This number can be used as a key for hashing.

This technique is mostly used in hashing so decrease the collision in hash maps.

This method has  a limitation that when we square a large number it may go out of range of integer so we have handle those cases.

8 0
3 years ago
The most common roof type is called a
timama [110]

Asphalt Shingles...............

8 0
3 years ago
Read 2 more answers
Which guideline should you follow when selecting the font for a presentation?
diamong [38]
Most teachers prefer you to use Arial or Times New Roman
3 0
4 years ago
âin order to aid a forensics investigation, a hardware or software ______________ can be utilized to capture keystrokes remotely
faltersainse [42]
(keystroke) logger. I'm hoping this is what you wanted.
5 0
4 years ago
Other questions:
  • The chart shows an example of a study-time survey. Students can use the formula shown in the survey to figure out ways to track
    14·1 answer
  • "the most common way to access the internet is through ________."
    5·1 answer
  • To locate something in the database, one must type in the keyword into the ________ of the application.
    12·1 answer
  • Briefly explain five measures you have undertaken to protect your confidential
    12·1 answer
  • Installation and the ongoing maintenance of software in a database system are the job of the database __
    6·1 answer
  • Explain steps in creating a main document for from letter. <br>​
    5·1 answer
  • After running the following pseudocode, what will the value of VARIABLE be? 1. Set value of VARIABLE to 5 2. Increase the value
    15·1 answer
  • If you need to change the typeface of a document, which menu will you choose?
    6·1 answer
  • Apart from mATX and ATX what are the other form factors of power supply
    7·1 answer
  • What are the methods of gilding<br><br>nonsense will be immediately reported. ​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!