1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alborosie
3 years ago
14

Computer programs can be opened from _____.

Computers and Technology
2 answers:
almond37 [142]3 years ago
7 0
Computer programs can be opened from _____.

All of above
gladu [14]3 years ago
3 0
Computer programs can be opened from _____.

all of the above
You might be interested in
A hacker has successfully infected an internet-facing server which he will then use to send junk mail, take part in coordinated
julia-pushkina [17]
Botnet Trojan. Hopefully that’s helpful :)
5 0
3 years ago
What is an border in html
kompoz [17]

Borders can be applied to most HTML elements within the body. To make a border around an element, all you need is border-style . The values can be solid , dotted , dashed , double , groove , ridge , inset and outset . border-width sets the width of the border, most commonly using pixels as a value.

8 0
3 years ago
Which of the following is not an operating system
mrs_skeptik [129]

Answer:

C

Explanation:

I hope this helped.

3 0
3 years ago
Read 2 more answers
What is an example of new technology having a negative impact on sustainability?.
Sedbober [7]

An example of new technology that is having a negative impact on sustainability is using multiple servers to maintain a cryptocurrency operation.

<h3>How does technology influence sustainability?</h3>

The use of technology is one that have a lot of power to increase productivity, efficiency and cost savings, and others  but it is also known to have a negative effect on the environment.

Sustainability implies that one meets the needs of people without having to compromise the power of future posterity to meet their own needs.

Learn more about sustainability from

brainly.com/question/25350238

3 0
2 years ago
Jacob holds a Computer Hacking Forensic Investigator (CHFI) certification. Which of the following responsibilities should Jacob
nadya68 [22]

Answer:

the answers too the questions are B. identify intruder footprints,

D. Director of security, and B. Nist framework

Explanation:

3 0
2 years ago
Read 2 more answers
Other questions:
  • Why has unicode become the standard way of converting binary to text??
    8·1 answer
  • Because we allow everyone full control, how do you make sure that the shared files are secure?
    8·1 answer
  • When doing a complex presentation, which of the following would be the best tool to begin designing your presentation?
    11·2 answers
  • An example of an email client is:<br> A.)Yahoo<br> B.)Gmail<br> C.)Outlook<br> D.)All of the Above
    9·1 answer
  • Which is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often dama
    14·1 answer
  • Write a C program to implement a command called ​displaycontent ​that takes a (text) file name as argument and display its conte
    9·1 answer
  • Write the method makeNames that creates and returns a String array of new names based on the method’s two parameter arrays, arra
    9·1 answer
  • Why is the transmission of information impartial on websites?
    10·2 answers
  • Whats important about the points?
    10·2 answers
  • How do i mark brainliest?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!