1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
White raven [17]
3 years ago
12

Which of the following is a rule of thumb for cell phones or smartphone etiquette ?

Computers and Technology
1 answer:
zimovet [89]3 years ago
3 0
Do not text whilst at the dinner table or cross the road (even a Zebr crossing) while texting.
You might be interested in
Exchanging which type of data uses the least bandwidth?
Over [174]
Voice. voice uses the least bandwidth
5 0
3 years ago
Read 2 more answers
Your team at amazon is overseeing the design of a new high-efficiency data center at hq2. a power grid need to be generated for
elixir [45]

Answer:

void print2(int row) {

for (int i = 0; i < row; i++) {

 char ch = 'a';

 char print = ch;

 for (int j = 0; j <= i; j++) {

  cout << print++;

 }

 cout << endl;

}

}

int count_digits(int num) {

int count = 0;

int temp = num;

while (temp != 0) {

 temp = temp / 10;

 count++;

}

return (num % count);

}

Explanation:

3 0
2 years ago
Quick time and flash are two examples of what product
zheka24 [161]

there apps .........

8 0
3 years ago
An executable file that was determined to be infected with a virus was terminated from the running processes list. However, afte
Mama L [17]

Mostly Trojan will has multiple version and I love u virus extra.

<u>Explanation:</u>

As first step workstation or desktop or laptop to scanned for virus and if any virus or malware found then it should be removed first. Operating system should be updated with latest patch, virus signature also be updated once again executed founded by virus infected.

Better to copy new exes and place in the same folder and try to execute again. If still the problem persists download antivirus software such as Norton, bit defender, Kaspersky etc. executable files affected by 15-20 viruses

8 0
3 years ago
What are 2 ways to access the vendor credit screen in quickbooks online?
kiruha [24]

Answer:

First by

Clicking

New Button (+) THEN click Vendor THEN click Credit

Secondly

Click Expenses Center then click New Transaction then finally click Vendor Credit

4 0
3 years ago
Other questions:
  • Narrowband Satellite Communications supports ______________ data rates for both mobile and fixed users by providing access on a
    8·1 answer
  • I can't find the errors! Could anyone help me please?!
    5·1 answer
  • Which of the following is not an Operating System? Select one:
    13·1 answer
  • It is an array containing information such as headers, paths and script locations wherein it is created by the web server itself
    8·1 answer
  • Assume that a 5 element array of type string named boroughs has been declared and initialized. Write the code necessary to switc
    5·1 answer
  • . Describe a way to simplify a complex problem.
    8·1 answer
  • Create a program that finds (n+1)! -factorial- of an integer n in C++.
    13·1 answer
  • State any three points of importance of local level profession​
    11·1 answer
  • What is multimedia hard ware? Write any four examples of multimedia hardware. <br>​
    13·1 answer
  • a cloud access security broker (casb) provides protection across 4 areas/pillars: visibility to detect all cloud services, data
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!