1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirza4 [7]
3 years ago
7

_ can be added to your computer to track your browsing activity and preferences.

Computers and Technology
1 answer:
VladimirAG [237]3 years ago
3 0
The answer is cookies!

Cookies can be added to your computer to track your browsing activity and preferences.

Hope I helped! :)
You might be interested in
Data are sent through a network on bundles called _______. select one:
hoa [83]
I think that the answer is packets.
4 0
3 years ago
Read 2 more answers
How many comparisons will be done to find 8 in this list using a linear search?
Margaret [11]

Answer:

I think 4 comparisons

8 0
3 years ago
What lets you do many things, like write book reports and stories?
Shalnov [3]

Answer:

4. application programs

Explanation:

5 0
3 years ago
ASAP!!!!****** Need help!!!!
m_a_m_a [10]
I think it's right. 
<span>Text, numbers, graphics, or sound represented by discrete digits, such as 1s and 0s.</span>
6 0
3 years ago
Which cell address indicates the intersection of the first row and the first column in worksheet?
Rzqust [24]

Answer:

A. A1

Explanation:

Worksheet's Columns are named with Alphabets. i.e. A,B,C,D,E....

And Worksheet's rows are named with numbers. i.e. 1,2,3,4,5....

So the intersection of first row number as "1" and First Column name as "A" is A1 as worksheet displays column name first and then row number.

8 0
4 years ago
Read 2 more answers
Other questions:
  • A wireless (radio) transmission of data can only travel a short distance.<br><br> True or false?
    9·1 answer
  • What are some consequences of internet addiction​
    9·1 answer
  • A form of speech that is used to clarify, describe, demonstrate, and/or explain is referred to as _____.
    7·2 answers
  • A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
    7·1 answer
  • Suppose you have an int variable called number. What Java expression produces the second-to-last digit of the number (the 10s pl
    15·1 answer
  • (70 points) This is a legit question that I have for a device FOR my homework.
    5·2 answers
  • According to the "multiple-selves" theory, of an online DVD rental service could offer same-day deliveries, so that people who o
    9·1 answer
  • True or False <br><br> Rootkits are only made by black-hat hackers.
    8·1 answer
  • I will give Brainliest and Extra points for correct answers!!!
    13·2 answers
  • Think of some local businesses that have websites. Look online and identify two different websites for businesses or services in
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!