1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fantom [35]
3 years ago
9

I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.

Computers and Technology
2 answers:
gulaghasi [49]3 years ago
4 0

Answer:

Pressing the Backspace key deletes the texts to the left of the insertion point.

Explanation:

elixir [45]3 years ago
3 0

Answer:

The word you are looking for is "right"

Explanation:

You might be interested in
Some 3d printers work by controlling the exact locations where a liquid
kow [346]
Were a liquid what? id doesn't make any sense.
6 0
3 years ago
Consider the unsigned decimal number 35. What is the value in hexadecimal?<br><br> 1. 3510 = ____ 16
Liula [17]

Answer:

23_{16}

Explanation:

When we convert any decimal number into the hexadecimal number we have to divide that number with 16.

Now according to question the decimal number is 35.

Now to convert this in hexadecimal divide it with 16.

\frac{35}{16} =2\frac{3}{16}

This means the quotient is 2 and the remainder is 3.

Therefore the value of hexadecimal is,

23_{16}

Therefore,

35_{10}=23_{16}.

 

8 0
2 years ago
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
A(n) ______ database stores data in tables that consist of rows and columns.
melisa1 [442]
The answer is a spreadsheet.
4 0
3 years ago
Read 2 more answers
Which of the following roles is responsible for creating cloud components and the testing and validation of services?
DanielleElmas [232]

Answer:

The correct answer to the following question will be Option D (Cloud service developer).

Explanation:

  • Developers are usually individuals who layout and build applications or websites such as web or software systems. They would be known as app or web developers in this regard. In the sense that they still build and maintain things, a software developer is quite similar, however-and here's the deciding factor-this is achieved on virtual clouds.
  • It is the responsibility of the cloud service developer to design and build cloud elements and products, as well as to check and validate services.

Therefore, Option D is the right answer.

7 0
3 years ago
Other questions:
  • Which of the following questions will most likely be answered by displaying data on a line graph?
    14·1 answer
  • An email address contains the @ character. Write a program that takes asks for an email address input from the user and determin
    5·1 answer
  • If given the chance to own manage a business,what will be the name of the business?
    11·2 answers
  • Image-editing software is used to _____.
    15·2 answers
  • I need help with question 3 I’ll give brainliest
    10·2 answers
  • Which cable standard is a standard for newer digital cable, satellite, and cable modem connections?
    11·1 answer
  • An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this
    9·1 answer
  • Which area located at the top of the word screen includes home , insert , and page layout ?
    13·2 answers
  • In two to three sentences, define "home row" and explain why it is important.
    6·2 answers
  • What was the name of the first personal computer and what year was it introduced
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!