1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sphinxa [80]
3 years ago
7

It would be system unit on this test

Computers and Technology
1 answer:
Dima020 [189]3 years ago
3 0
Yes thats correct- but if 
You might be interested in
We investigated a program which is probably used as one component of a bigger password breaking algorithm. We determined that th
Svetlanka [38]

Answer:

i dont know

Explanation:

3 0
3 years ago
Someone pls help me do this and don't ask for brainliest or say random answers not related to this.
Marat540 [252]
I used to use pixlr all the time so i should know.
Ok so

1 is picker
2 is lasso select
3 is crop
4 is Liquefy
5 is clone
6 is dodge/burn
7 is Pen
8 is Eraser
9 is Gradient
10 is Text
11 is Zoom
12 is Switch Colors
13 is Marquee Select
14 is Wand select
15 is Cutout/Mask
16 is Heal
17 is Blur/Sharpen
18 is Sponge Color
19 is draw
20 is Fill
21 is I don’t know I have never seen that before
22 is Picker

So sorry if it took a while i did not know what the star was
3 0
3 years ago
Read 2 more answers
How will you keep the buzz going post-hackathon?
Anna71 [15]

Answer:

it would be nice if you gave some form of info here

Explanation:

in other words without information no help aka I'm slow and just need points

8 0
1 year ago
How is your day going?Technology affects the learning experience of students by helping them
Alex_Xolod [135]

Answer:

is this technology or

Explanation:

computer

5 0
3 years ago
Read 2 more answers
Which TWO are examples of the internet reducing the use of paper?
storchak [24]

Answer:

Using word documents instead of paper can save lots of paper especially, when lots of people are doing that already. Using emails can reduce the amounts of letters being sent to people.

7 0
3 years ago
Other questions:
  • A(n) ____ is an attack that takes advantage of a system vulnerability.
    7·1 answer
  • Why is there more content on youtube in 4k then there is on cable, satellite, and digital tv combined?
    6·2 answers
  • Which two encryption protocols might be used to provide secure transmissions for browser and web server communications?
    14·1 answer
  • Because it takes time to change an organization’s culture, the ISO must continually monitor security policy compliance. The ISO
    9·1 answer
  • Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to resea
    9·1 answer
  • I need help thanks please!
    8·2 answers
  • Why is science, mathematics, and technology different from engineering?
    15·1 answer
  • Table Setting in any occasion can add to the beauty and significance of the event. It may
    6·1 answer
  • In 1972, earlier designers built the
    6·1 answer
  • HELP<br> When differentiating data, the WHAT of the data is:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!