1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
4vir4ik [10]
3 years ago
11

whats something that u want to do but ur parents wont allow it like having a phone or going to a college ​

Computers and Technology
2 answers:
den301095 [7]3 years ago
6 0

Answer:

getting a motorcycle and getting a tattoo

Yuri [45]3 years ago
6 0

Answer:

My answer to this is to have instagram

Explanation:

You might be interested in
How do Web browsers interact with URL/URIs to navigate the internet
iVinArrow [24]

Answer:

They smart dats y!

Explanation:

6 0
3 years ago
What tasks should a laptop accomplish?
Marta_Voda [28]

Answer:

general & personal used for computing.

3 0
3 years ago
The process of changing data from their original form to a format that more closely fits the research objectives of the research
lys-0071 [83]

ANSWER- True


Data transformation is defined as the process of converting data or information from one format to another. Usually, the data or information is changed from the original format (The format of a source system) into the required format of a new destination system; a format that fits the objectives of the research/study.

8 0
3 years ago
Why should you make sure the paper being used in a printer is dry and not damp?
Goryan [66]

Answer:

because the printer ink is liquid

Explanation:

you need a dry paper to let the ink sit in place and print out the exact same thing that u needed to print if you're printing on a damp paper there is a chance it will affect the output of whatever your printing

6 0
2 years ago
______ is the software that blocks a user from being able to access your computer.
antiseptic1488 [7]
The answer is firewall. It is a network security device that observes inbound and outbound network traffic and chooses whether to allow or block specific traffic based on a well-defined set of security rules. Firewalls have been a first line of protection in network security for over 25 years. The firewall present a barrier between measured and secured internal networks that can be trusted and untrusted outside networks, for example the Internet. A firewall can be software, hardware, or even both.
8 0
3 years ago
Other questions:
  • The EPA requires the use of precise forms called ?
    14·1 answer
  • A ____ is a prewritten formula that is built into excel.
    6·1 answer
  • Write a recursive function, replace, that accepts a parameter containing a string value and returns another string value, the sa
    5·1 answer
  • A key physical design element is the ____, which describes how users interact with a computer system
    11·1 answer
  • Assume there is a variable , h already associated with a positive integer value. Write the code necessary to count the number of
    13·1 answer
  • Students who respond promptly to e-mails are following which netiquette rule?
    13·2 answers
  • The first known permanent photograph was called "View from the Window at Le Gras." True False
    9·1 answer
  • What will be the range of the random numbers generated by the following code snippet? rand() % 50 + 5;
    14·1 answer
  • Question 1 (1 point)
    9·1 answer
  • The excerpt is a sample works-cited list.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!