1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ozzi
4 years ago
7

Do you like Houseparty?

Computers and Technology
1 answer:
steposvetlana [31]4 years ago
3 0
Yes it’s really fun
You might be interested in
What kind of network connection do you think is used to connect most wireless video game controllers to consoles, and why would
Ostrovityanka [42]

Answer:

I would say Lan

Explanation:

5 0
3 years ago
The process of using or controlling two or more windows at a time is known as. a threading .b multitasking. c hyperthreading.d s
mixas84 [53]
<span>The process of using or controlling two or more windows at a time is known as multitasking.</span>
5 0
3 years ago
An authenticated user can add up to how many computer accounts to the domain, by default
Brums [2.3K]
By default, 10 computers can be joined to the domain by both users and administrators. As long as a user is authenticated against the Active Directory, he or she can add up to 10 computers to the domain.
While this one posses as an advantage for smaller companies, it is not a desirable feature for bigger companies since they have to control more tightly who can add machines to their domain.
7 0
4 years ago
Which of the following statements is false?
GrogVix [38]

Answer:

bnnnnn A1

Explanation:

bnnnnnjm

8 0
3 years ago
Which word processing file that contains text and other
Oksi-84 [34.3K]

Answer:

B . document

Explanation:

Word document contains text, table, picture and more. Word document is a file of .doc, .docx etc format

Table, ribbon or keyboard can't be classed as a file and they are elements of a file, menu or hardware

<u>So correct option is</u> B. Document

7 0
3 years ago
Read 2 more answers
Other questions:
  • When should you check to see that fuel lines, connections, and fuel vents are in good condition?
    7·1 answer
  • What functionality can a vulnerability scanner provide that a port scanner cannot?
    12·1 answer
  • Using the expected format, of putting key information where the reader can’t find it, is an example of?
    8·2 answers
  • Jason is a computer hardware engineer. His work involves assembling computers. What will Jason need to assemble a microcomputer
    11·2 answers
  • Taken together, the physical and data link layers are called the ____________________. Internet layer Hardware layer Internetwor
    15·1 answer
  • Write a program to read a record from a binary file
    8·1 answer
  • True or false A job analysis weight the positives and negative of a given career
    13·1 answer
  • Explain the effects of disposing electronic equipments to the environment ​
    13·1 answer
  • Is there actually a difference between left and right twix
    9·1 answer
  • The _____ constraint assigns a value to an attribute when a new row is added to a table
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!