answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SashulF [63]
1 year ago
15

Which of the following word pairs correctly completes the sentence below?

Computers and Technology
2 answers:
garik1379 [7]1 year ago
7 0

B) Negative, Positive

Julli [10]1 year ago
4 0

B. negative, positive

You might be interested in
Which word in brackets is most opposite to the word in capitals? PROSCRIBE (allow, stifle, promote, verify)​
Sunny_sXe [5.5K]

the answer would be stifle

7 0
1 year ago
Read 2 more answers
Choose the correct function to convert the user’s response to the number 3.5. >>> answer = input("How much does the sam
FromTheMoon [43]

Answer:

The answer to the given question is given bellow in the explanation section:

Explanation:

<p>This is python code</p>

<p>In python when you enter input into the input function as given:</p>

<code> answer = input("How much does the sample weigh in grams? ") </code>

I will be taken as string.

So I have to convert this string to number format here the given data is float value i-e 3.5

so let convert it. using float function.

<code> answer = float (input("How much does the sample weigh in grams? ") )  </code>

6 0
1 year ago
Read 2 more answers
As the network administrator for a growing isp, you want to make efficient use of your network addresses. one of the network add
lubasha [3.4K]

New Subnet Mask:

255.255.255.240

First 4 subnetwork Addresses:

197.14.88.0

197.14.88.16

197.14.88.32

197.14.88.48

6 0
1 year ago
Health care organizations must strictly comply with HIPAA regulations which require these organizations to maintain proper secur
Marrrta [24]

Answer:

b. Unauthorized access to organization-owned workstations

Explanation:

Base on the scenario been described in the question, the option the risks would most directly violate HIPAA compliance if compromised is Unauthorized access to organization-owned workstations

Ethical health research and privacy protections both provide valuable benefits to society. Health research is vital to improving human health and health care. Protecting patients involved in research from harm and preserving their rights is essential to ethical research. For the reasons, there certain risk they cannot take, but in this case, the risk they are will to take is the been mentioned.

7 0
2 years ago
​Scott works for an online retailer and has to format the border around each element on their web page. He has to set the border
Pavel [41]

Choices for the question are not given to select from, but the answer is obvious and unique so it is given below.

Answer:

border-color: grey, black, black, grey;

Explanation:

For making the colored borders on a web page, the property border-color of used. It has 1 to 4 elements/values  (as needed) to color the borders. The order of the borders (elements) is given below:

  1. top
  2. right
  3. bottom
  4. left

Now as explained above these elements can also be three instead of four displaying the colors of first three sides that are top, right and bottom.

Similarly, when one or two elements will be given the color of respective borders will be changed.

Note:

We should first set the border-style (design) property then move towards the color property.

i hope it will help you!

7 0
1 year ago
Other questions:
  • What helps companies and organizations to target masses of people, provide 24/7 services, and deliver better marketing in a chea
    13·2 answers
  • Which of the following word pairs correctly completes the sentence below?
    15·2 answers
  • Why are computer manufacturers constantly releasing faster computers? how do computer users benefit from the increased speed?
    7·1 answer
  • HELP PLEASE ASAP brainliest to accurate
    14·2 answers
  • Discuss how the user-designer communications gap can cause a good project to go bad.
    8·1 answer
  • A major weakness of a lot of file processing systems is that ____.
    10·1 answer
  • Mathematical computations by a computer are faster than your quickest mathematical computations because the top speed of a neura
    13·1 answer
  • A computer system uses passwords that are six characters and each character is one of the 26 letters (a-z) or 10 integers (0-9).
    13·1 answer
  • E xercise 17.2.4: The following is a sequence of undo-log records written by two transactions T and U: &lt; START T&gt;; ; &lt;
    15·1 answer
  • There are two cons to an OLTP database. Which of the following are a solution of these cons?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!