1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlabodo [156]
3 years ago
5

How do I persuade my parents to allow me to have social media? I will be 15 in a week or so, so I am old enough. I'm pulling my

grades up, I help around the house, I am in honors classes, I help my siblings out with school, I help make dinner, I just help a lot. What should I do?
Computers and Technology
1 answer:
Flauer [41]3 years ago
6 0

Answer:

my explanation is above my comment :)

Explanation:

You might be interested in
If you delete a file from removable media, it is stored in the recycle bin where you can recover it until you empty the recycle
Natasha2012 [34]

The appropriate response is no. why you can't discover it. After we erased our information, the information will be put away recycle bin, on the off chance that you purge the reuse receptacle, the information will be erased, and in the meantime, Windows will list the space as accessible room. On the off chance that you cover the recycle bin with other data's, the information put away before will really lost, so in the event that you need to recuperate the information in our recycle bin, don't attempt to cover it with something else.

<span>On the off chance that you may need to recuperation it, For standard individuals, we can't recuperation it straightforwardly, on the off chance that you have enough cash, you can send it to a few information recuperation organization to acknowledge proficient recuperation, however to the extent I am concerned, few of us can pay for it in view of a few information, you may feel frantic, yet another way, is attempt to utilize a few information recuperation programming.</span>

5 0
3 years ago
A slow response when opening applications or browsing the Internet, applications that do not work properly, an operating system
blagie [28]

Answer:

C. Symptoms of malware mutation

Explanation:

They are signs that could indicate that ones system is infected by virus.

Such signs includes:

1.Slow booting or startup.

2.Low space storage.

3.Blue screen of death.

4.Slow Internet performance.

5.Sending of spam messages.

6.Disabled security.

7.Browsing error.

8.Pop-up messages.

9.Renaming of files.

10.Loss of certain files, music, messages, etc.

3 0
3 years ago
Read 2 more answers
Why do networks need standards?
svetoff [14.1K]

Answer:

4. Standards are what guarantee that the different pieces of network are configured to communicate with one another

Explanation:

Networking standards ensure the interoperability of networking technologies by defining the rules of communication among networked devices. Networking standards exist to help ensure products of different vendors are able to work together in a network without risk of incompatibility

Hope it will help you...

3 0
3 years ago
The name for the instructions you write to a computer in a program
aliina [53]

Answer:

Code

Explanation:

The code is instructions that you can write yourself or download from online

4 0
2 years ago
Read 2 more answers
What command launches the remote desktop client for windows?
Ksju [112]
%windir%\system32\mstsc.exe

launches the RDP client.
7 0
3 years ago
Other questions:
  • What component on a smartphone requires pairing with another device?
    8·1 answer
  • you were discussing software privacy with a friend were surprised to learn how software privacy can impact your life everyday. w
    10·1 answer
  • According to Mintzberg's classification of managerial roles, the role of a(n) ______ is to transmit information received from ou
    7·1 answer
  • The Internet of Things (IoT) is a concept with emphasis on machine-to-machine communications to describe a more complex system t
    10·1 answer
  • True or false: a cover letter accompanies a resume to showcase a job-seeker’s personal life
    6·2 answers
  • Suppose a data broker correctly identifies that your grandmother is addicted to playing online hearts. From its business intelli
    8·1 answer
  • Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.
    9·1 answer
  • HIPAA requires the following controls for medical records: A. Encryption of all data B. Technical safeguards C. Physical control
    12·1 answer
  • In order for bitlocker to protect the system volume without the aid of an external drive, your computer must:
    12·2 answers
  • What is the by stander effect
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!