1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAXImum [283]
2 years ago
15

2

Computers and Technology
1 answer:
BaLLatris [955]2 years ago
3 0

Answer:

the control center

Explanation:

<h2><em>hope this helps :)</em></h2>

<em>please make me brainliest\</em>

You might be interested in
What type of encryption is currently used to secure wpa2?
MaRussiya [10]
AES (Advanced Encryption standard) is currently used to secure wpa2.
3 0
3 years ago
Knowledge and experience help you
Zarrin [17]

Answer:

yes it can it shows u what you did wrong or what you did right

Explanation:

brainlet me please

8 0
3 years ago
What are binary code​
s2008m [1.1K]

Answer:

Binary code is a coding system using binary digits 0 and 1 to represent a letter, digit, or other characters in a computer or other electronic device. The binary code assigns a pattern of binary digits, also known as bits, to each character, instruction, etc.

3 0
3 years ago
Read 2 more answers
Which view shows how the document will look when printed?
DIA [1.3K]
Please provide photos for your question.
7 0
4 years ago
In procedural programming, where does the flow of control usually route from the main function?
Zinaida [17]

Answer:

Subroutine or called function.

Explanation:

Procedural programming is a programming techniques of creating modular divisions between lines of code, with a provision to call and run a block of code at any given instance in the program.

A program flow control breaks at will from the main function to a target defined function or subroutine, which returns a value back to the normal flow of the program. It uses conditional and loop statement to achieve its task.

6 0
3 years ago
Other questions:
  • What happens if you never confirm your facebook account?
    8·1 answer
  • What portable computing devices, designed for user convenience, have a sensor called an accelerometer that senses vibrations and
    10·1 answer
  • Why is ipsec considered to be a transparent security protocol?
    6·1 answer
  • Based on the Pizza database you imported, complete the SQL statement below to add the column VIP to the customers table. The cus
    8·1 answer
  • What is an Odometer (Driver's Ed)
    7·2 answers
  • You want to change your cell phone plan and call the company to discuss options. This is a typical example of CRM that focuses o
    9·1 answer
  • According to a case study in one of our weekly chapter reading, nearly..................... percent of all employees send work e
    11·2 answers
  • Summarise all what you know about spss​
    15·1 answer
  • What is node ? Briefly explain with diagram<br><br>​
    8·1 answer
  • Which hardware component interprets and carries out the instructions contained in the software.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!