1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mestny [16]
4 years ago
5

How do you scan a qr code on your iPhone

Computers and Technology
2 answers:
CaHeK987 [17]4 years ago
7 0

Answer: I'll be honest if I was you I would look on yt or google it. (Also, can you please give me a thanks it'll really help out.) :)

Explanation:

ELEN [110]4 years ago
6 0

Go to the Settings section of your device, then turn on Scan QR Codes.

Go to your camera, and scan it!

Bingo! Hope this helps!

You might be interested in
Who here would like to play among us with me? <br> Time: Friday, November 13
Ira Lisetskai [31]

Answer:

BRO I WANNA!

My among us name is "A cop"

What time?

Explanation:

8 0
3 years ago
Green computing can be achieved by: a. using video conferencing, electronic meeting systems, and groupware. b. replacing meeting
Rama09 [41]

Answer: using video conferencing, electronic meeting systems, and groupware

Explanation:

Green computing simply means the use of computer in a way that's environmental friendly.

One way to achieve this is through using video conferencing, electronic meeting systems, and groupware. This allows the use of computers not to have a negative effect on the environment.

4 0
3 years ago
If you give someone ______ to your device, they can control it through another phone or computer.
icang [17]

If you give someone <u>Remote access </u>to your device, they can control it through another phone or computer.

<h3>What is  Remote entry?</h3>

An authorized user can use remote access to connect to a computer or network from a different location using a network connection. Users can connect to the systems they require through remote access even if they are physically far away.

Therefore, the dangers to remote access are:

  • There is a risk of device loss or theft due to a lack of physical security safeguards.
  • as the data is transmitted through a public internet, eavesdropping.
  • unapproved access to systems or data, possibly while oblivious to the screen.
  • If someone gets access to the gadget, they could watch and change the data.

Learn more about Remote access from

brainly.com/question/28900477
#SPJ1

5 0
2 years ago
what is the keyboard shortcut to display formulas on the worksheet : a. CTRL+ B. CTRL+: C. CTRL+; D. ALL THE ABOVE
Orlov [11]
Girl i dont know figure it out pookie
4 0
3 years ago
What's up with this new update?
Andre45 [30]

Answer:

so do i the notifications are out of control i try to ignore them

Explanation:

and yea so it seems you like to do things such as VR? if so i suggest one from the Oculus brand i dont use them but i heard they were good!

~Brianna/edgumacation

4 0
3 years ago
Read 2 more answers
Other questions:
  • The inflexible, circular platters on ____ disks use magnetic particles to store data, instructions, and information.
    5·1 answer
  • Which input device uses optical technology?
    9·2 answers
  • Does anyone have game design in connections
    13·1 answer
  • People are able to predict future events to some extent because: (Select all that apply)
    11·1 answer
  • A network technician has created a network consisting of an external internet connection, a DMZ,
    14·1 answer
  • 5-16) (Bar Chart Printing Program) One interesting application of computers is to display graphs and bar charts. Write an applic
    10·1 answer
  • What is different between a pc mouse and a real mouse
    12·2 answers
  • What is the limitation of computer<br>​
    5·1 answer
  • Please help!!
    12·2 answers
  • What is the difference between an html opening tag and a closing tag?.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!