1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lorico [155]
3 years ago
7

Complete the sentence.

Computers and Technology
1 answer:
Luda [366]3 years ago
6 0
The answer is Tablets
You might be interested in
If i were to give you free points woulld you take them?
kipiarov [429]

Answer:

D) friend me

Explanation:

6 0
3 years ago
Read 2 more answers
Which of these is unused normal, unvisited link ??
Tomtit [17]

Answer:

hover

Explanation:

hope my answer help you

8 0
3 years ago
W t f is a ground fault circuit interrupter?
LuckyWell [14K]

lol you are awesome but to break it down for you a circuit inter-putter is is a plug in the is on the floor i have 2 of these in my home. i hope this helps you Mr. w t fer lol hahahaha XD

8 0
3 years ago
Read 2 more answers
? An attempt to harm damage or cause threat to a system or network is broadly termed as
Radda [10]

Answer:

A cyber attack or hacking

Explanation:

6 0
3 years ago
Identify the menu under which you'll find the Header and Footer option.
Genrish500 [490]

The answer is B. View.

4 0
3 years ago
Other questions:
  • What languages do most of the students at Miami High School speak?
    6·2 answers
  • ______ devices are high-performance storage servers that are individually connected to a network to provide storage for the comp
    5·1 answer
  • A rang check that could be use to validate... Date and time
    13·1 answer
  • While doing research on the Internet, what kind of website should you avoid because the information may be biased?
    11·1 answer
  • Review the two e-mail messages below for their adherence to the guidelines for professional e-mail correspondence you have learn
    6·1 answer
  • Which are guidlines for using themes? Check all that apply
    13·1 answer
  • ANSWERED CORRECT BELOW
    7·1 answer
  • Compare and contrast two fundamental security design principles in network security. Analyze how these principles and how they i
    15·1 answer
  • 2. Released in 1992, Street Fighter II, the revolutionary fighting game, was developed by which company?
    8·2 answers
  • Assume the user types in 7 for x and 2 for y. What is output by the
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!