1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatiyna
2 years ago
6

What is the answer in music class

Computers and Technology
1 answer:
nadezda [96]2 years ago
6 0

Answer:

True

Explanation:

mark brainliest :)

You might be interested in
The general syntax to overload the stream extraction operator >> for a class is ____.
Aloiza [94]
Istream& operator>> (istream& input, Example& example)
{
// Extract your data from input stream here
return input;
}
5 0
4 years ago
Plsss help me<br><br>1)give 2 examples of systems that you use or see in your day-to-day life​
Gnoma [55]

Answer:

The modern world has numerous kinds of systems that influence daily life. Some examples include transport systems; solar systems; telephone systems; the Dewey Decimal System; weapons systems; ecological systems; space systems; etc.

5 0
3 years ago
Prepare a document to list down at least 10 features/operations (on process and thread) you can do using Process Explorer.
leonid [27]

Answer:

The operations that can be carried out using process explorer include but are not limited to:

Explanation:

  1. Killing a Process Tree
  2. Ending or terminating a process
  3. Suspending a process
  4. Examining which process has locked a file
  5. Manually detecting a virus
  6. Unhiding a process. This can help to callup the window for a process that is not visible under normal explorer activities
  7. Monitor CPU usage
  8. setting the priority of a process
  9. changing a service process's access security
  10. Monitoring Graphics Processing Unit

Cheers

6 0
3 years ago
________ involves the use of the internet to steal important information.
Ivenika [448]
Phishing involves the use of the Internet to steal important information.
Shoulder surfing refers to people spying on other people while they are using an ATM. Skimming a credit card refers to thieves using a device in ATMs to steal information from cards. Dumpster diving refers to picking trash from dumpsters.
5 0
3 years ago
How do i clear my search history ?
nydimaria [60]
If an iphone go to the open book icon then go to history and clear from there if on a laptop go to the top right and look at the three ... press it and go to history and press clear history I don’t remember about android
4 0
3 years ago
Read 2 more answers
Other questions:
  • This is not a factor that you should use to determine the content of your presentation. Your audience your goals your purpose yo
    7·2 answers
  • C2.5 - A group of four pirates has a treasure chest and one unique lock and key for each pirate. Using hardware that is probably
    6·1 answer
  • Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that c
    15·1 answer
  • The encapsulation unit on the presentation layer of the osi model is
    10·1 answer
  • The protocol that enables computers on the Internet to communicate with one another is called _____.
    10·2 answers
  • the microsoft excel application is a _____ program. database word-processing spreadsheet desktop-publishing
    8·1 answer
  • A forensic investigator at a crime lab is performing a forensic analysis of a hard drive that was brought in by state troopers.
    10·1 answer
  • What protocol communicates data between routers representing the edges of autonomous systems?Distance-vectorLink stateInterior g
    11·1 answer
  • List three things to be safer online.
    8·1 answer
  • While working in a group of two the members are not getting along. You bring the two members together so they can discuss this i
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!