1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stells [14]
3 years ago
7

You should always buy the biggest camera bag that you can find for extra equipment.

Computers and Technology
2 answers:
Akimi4 [234]3 years ago
7 0

Answer:

true

Explanation:

arsen [322]3 years ago
7 0

Answer: true

Explanation: to have more space

You might be interested in
Linux is: Select one: a. primarily concerned with the tasks of end users. b. designed for specific machines and specific micropr
ivann1987 [24]

Answer:

C. an example of open-source software.

Explanation:

open-source software is the type of software in which anyone can access, it can also be shared And modified by anyone simply because ita accessible to the public.

Hence and open source software's source code can be

inspected, enhanced and modified by anyone. A typical example is Linux.

7 0
3 years ago
What are some examples of environmental technology
Zarrin [17]
Some examples of environmental technology is recycling.
3 0
3 years ago
There's a right and a wrong way to act on the internet. The right way includes practicing proper netiquette.
DaniilM [7]

Answer:

Netiquette is a combination of the words network and etiquette and is defined as a set of rules for acceptable online behavior. Similarly, online ethics focuses on the acceptable use of online resources in an online social environment.

  • Be Careful With Your Tone.
  • Be Accurate and Factual.
  • Search First, Then Ask.
  • Don't Use Sarcasm Freely.
  • Be as Polite as You Are In Person.
7 0
2 years ago
Read 2 more answers
Generally considered to be the most important information security policies, what item below defines the actions a user may perf
tamaranim1 [39]

Answer:

A. Acceptable use policies

Explanation:

These specific actions that the user may perform are all described in the acceptable use policy. The company usually requires that the user read and sign this policy before being granted a network ID into the system itself. By signing this agreement the individual user agrees to perform ONLY the actions listed in the agreement and nothing else and are restricted from unauthorized areas.

3 0
4 years ago
PLZZZZZZZZZZZZZZZZZ HELP I WILL GIVE 85 POINTS AND MARK BRAINLIEST
nirvana33 [79]

Answer:

Hey here is a tip: for your essay put your letters in white ink at the end  so it looks like 300 words.

Explanation:

8 0
3 years ago
Other questions:
  • Jameis is researching at his local library when he finds a perfect source to use in his paper. When he goes to check the book ou
    12·2 answers
  • Assume you're running a query on your orders in the past year. You want to see how many orders were placed after May. What type
    5·1 answer
  • How does classless inter-domain routing (cidr) help reduce waste of ip addresses?
    8·1 answer
  • Using PowerPoint or Impressed guarantees that your presentation will do which of the following?
    6·1 answer
  • The continue statement _________.
    11·1 answer
  • What does it mean for a heap to be complete?
    7·1 answer
  • [30 points, will mark Brainliest] Which of the following is the lowest hexadecimal value? Explain why. Options to chose; F2, 81,
    9·1 answer
  • wants to redesign the user interface. The customer service agents use ________ to enter explicit statement to invoke operations
    11·1 answer
  • What is the document that provides basic guidance and regulatory requirements for derivative classification
    9·1 answer
  • What is the difference between computer hardware and computer software?<br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!