1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kodGreya [7K]
3 years ago
11

My Sony flatscreen tv's remote won't work. I can't turn up the volume or use buttons other than turning it on. I can't open the

menu either.
Computers and Technology
1 answer:
sashaice [31]3 years ago
4 0
Get a universal remote, maybe you spilt something
You might be interested in
You want to substitute one word with another throughout your document. What tool(s) should you use?
Usimov [2.4K]

Answer:

the replace tool

Explanation:

3 0
4 years ago
Local Area Networks (LANs)
wel

Answer:

increase networking speed

Explanation:

2020 edge

7 0
3 years ago
Read 2 more answers
What is the difference in adware and spyware
Katarina [22]

Generally speaking, adware is a program that installs an additional component that feeds advertising to your computer, often by delivering pop-up ads or by installing a toolbar in your browser.

Some adware may hijack your browser start or search pages, redirecting you to sites other than intended. Unless you're a fan of guerrilla marketing, such tactics can be annoying. Worse, the mechanism that feeds the advertising can introduce system anomalies or incompatibilities that cause problems with other programs and can even disrupt the functioning of the operating system.

Spyware surreptitiously monitors your computer and internet use. Some of the worst examples of spyware include keyloggers who record keystrokes or screenshots, sending them to remote attackers who hope to glean user IDs, passwords, credit card numbers, and other sensitive information.

Most often, though, spyware takes a more benign but still quite offensive form. The information gathered, often referred to as "traffic data," can consist of monitoring the websites visited, ads clicked, and time spent on certain sites. But even in its more benign form, the collected data can morph into something far more insidious.

Hope this helped.. ;D

3 0
3 years ago
Read 2 more answers
3.12 LAB: Output range with increment of 5 Write a program whose input is two integers, and whose output is the first integer an
Zinaida [17]

The INPUT code of the given programme in Java would be as given below:

In this first we are taking input of two integers j and k from the user and then performing the required operations over it

import java.util.

Scanner;  public class LabProgram {    

public static void main(String[ ] args) {  

Scanner scnr = new Scanner(System.in);        

 int i,j;        

 i  = scnr.nextInt();        

 j = scnr.nextInt();        

if(i<=j) {            

int k = i;            

while (k <= j) {                

System.out.print(k + " ");                

 k = k + 5;            

 }            

 System.out.println();        

 }        

 else{            

 System.out.println("Second integer can't be less than first.");                  

}    

}

}  

Learn more about Java Programming here:

brainly.com/question/18554491

#SPJ10

8 0
2 years ago
DJ Davon is making a playlist for an internet radio show; he is trying to decide what 1212 songs to play and in what order they
Alja [10]

There are some typos in this question as the numbers become too large and lead to undefined during calculations.

so the correct data is:

Songs = 12

Rock = 15

Blues = 20

Disco = 15

The answer & explanation for this question is given in the attachment below.

4 0
3 years ago
Other questions:
  • A process-based DO/S must synchronize actions across the network. When a process reaches a point at which it needs service from
    6·1 answer
  • Calculated fields can be entered in queries. What row should you type a calculated field in?
    13·1 answer
  • C2.5 - A group of four pirates has a treasure chest and one unique lock and key for each pirate. Using hardware that is probably
    6·1 answer
  • Your desktop, Internet Explorer®, and the Media Player can be started from this area on most computers.
    10·2 answers
  • Employees of Bodegas &amp; Bistros Inc. (2B) maintain a password-protected social media page to "vent about work." When 2B learn
    12·1 answer
  • What is an optimal Huffman code for the following set of frequencies, based on the first 8 Fibonacci numbers?
    8·1 answer
  • Write a program that sorts an array of 20 random numbersin the range from 0 through 1000.
    6·1 answer
  • Maximum number of character symbols represented by Unicode
    6·1 answer
  • When creating envelopes, how will you adjust the layout?
    10·2 answers
  • Which option is designed by software engineers?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!