1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rasek [7]
4 years ago
12

Can you believe everything you read online?

Computers and Technology
2 answers:
Tasya [4]4 years ago
8 0

Answer:

no

Explanation:

bcoz some time it can be a rumour

Maurinko [17]4 years ago
5 0

Answer:

no hope some things will be fake dude

You might be interested in
A baseball diamond has an area of 3,600 square feet. What is the distance between each base? How far will a runner run around th
Ksju [112]
Also ~ how far does a runner run around the bases on a home run? It's explained in my answer. lw = sa (length times width = surface area) So multiplying length by width (since they're the same in this case you're squaring the length or squaring the width - no difference) You'll get 3600 feet.
6 0
3 years ago
Which two hardware features would a technician monitor within the bios if a computer was suspected of overheating?
Firdavs [7]
I would say probably the CPU Fan and the CPU clock speed 
4 0
3 years ago
A top level class may have only the following accessmodifier.
GREYUIT [131]

Answer: Public

Explanation:

 A top level class can have a public, as top level cannot be private and protected because the modifier private is not allowed. As, top level is a class which is not a nested class. Interface of a access modifier is either public or no modifier. There are two types of access control modifier are top level - public and member level- private, protected.

3 0
4 years ago
Write technical term of following statements: a.The set of programs to perform specific task. b.A feature of computer which tell
ExtremeBDS [4]

Answer:

a) Application software

d) Lady Augusta Ada Lovelace

b) (it may be versatility

6 0
3 years ago
In which situation would you typically use a stand-alone certificate authority (CA) in your public key infrastructure (PKI) desi
denpristay [2]
The animals have no place way to get go to sleep
5 0
3 years ago
Other questions:
  • What is a file allocation table (FAT), andwhere is it found on a floppy disk?
    5·1 answer
  • What are the two components that make up the chipset?
    15·1 answer
  • The following algorithm adds all the entries in a square n × n array A. Analyze this algorithm where the work unit is the additi
    7·1 answer
  • What factors should you consider when buying a hard drive?
    8·1 answer
  • Write a function named wordLineCount with the following input and output: Input: a string parameter, inFile, that is the name of
    9·1 answer
  • Display the total number of parking tickets.
    5·1 answer
  • 4.9 Code Practice: Question 3
    15·2 answers
  • 4. Write a program to calculate square root and<br>cube root of an entered number .​
    6·1 answer
  • When comparison shopping, all of these hint at a good deal EXCEPT_____________________.
    5·1 answer
  • Which three options below describe typographic hierarchy?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!