1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnom [1K]
4 years ago
6

How do you ask someone for help?

Computers and Technology
1 answer:
kakasveta [241]4 years ago
5 0
It all depends what you need from that certain person, like maybe you're failing a class and need help from a friend who is better than you at that class, you could say, "hey look man i'm really struggling in this class. Could you help me?" just be straight up with them. or you could message them
You might be interested in
Malware or malicious software does not include which of the following? A. Spyware B. Trojan Horses C. Computer viruses D. New so
Fed [463]
I would say answer choice D
6 0
3 years ago
Read 2 more answers
The pointed over text within a paragraph the cursor takes the shape of alan
Helen [10]
When pointed over text withing a paragraph  the cursor takes the shape of an I-beam.  <span>The I-Beam is the default cursor when hovering over text.  However, it is possible to change it.</span>
4 0
3 years ago
the hardare components of a computer system interact with each other by using which of the following?
adoni [48]

Answer: ports and system bus

Explanation:

6 0
4 years ago
Using a pin or password in addition to tpm is an example of what type of authentication?
anzhelika [568]
Considering it is private i would say security?
3 0
3 years ago
To use the program service routines, the user's program makes requests to the operating system through the
Contact [7]
To use the program service routines, the user's program makes requests to the operating system through the application programming interface (API).
API  <span><span>is defined interfaces</span> that specifies how software components interact  with each other and </span><span>between an enterprise and applications that use its assets.</span>




8 0
3 years ago
Other questions:
  • What are the 4-bit patterns used to represent each of the characters in the string "1301"? Only represent the characters between
    14·1 answer
  • The process of saving files to disk is called.<br> A.read<br> B. Write<br> C. Lock<br> D. Protect
    6·1 answer
  • What is the advantage of defining a target user?
    6·1 answer
  • People without digital literacy skills are often the victims of
    12·1 answer
  • PLZ HELP I DIDNT MEAN TO CLICK THAT ANSWR I NEEDD HELP
    15·1 answer
  • How many total bits are required for a direct-mapped cache with 128 blocks and a block size of 8 bytes, assuming a 4GB main memo
    15·1 answer
  • JAVA
    8·1 answer
  • What is the best way of transmitting data safely
    9·1 answer
  • What do other people think of e.t <br> in the movie E.T
    5·1 answer
  • A(n) _____ is the address of a document or other file accessible on the internet.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!