1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PilotLPTM [1.2K]
3 years ago
7

How do I make my own extension for chrome?

Computers and Technology
1 answer:
Alexeev081 [22]3 years ago
4 0
Open your browser and click the 3 strip bar in the conner and then look toward the bottom and click settings and it will open a new browser and then you are going to look at the left side and you will see extension click it and there you go...

You might be interested in
When you use the keyboard to scroll to a different position in the document, the ____ automatically moves when you press the des
FrozenT [24]

Answer:

Option C i.e., insertion point is the correct option.

Explanation:

if any user or person scrolls the following contents by using the keyboard from one position to another position in the document of the user then, the insertion point moves automatically without any implementation when the user presses any key they want. If the user clicks on the arrow keys then, it also works like that. So, that's why the following option is correct.

8 0
3 years ago
What effect can camera tilt create? Do you think this is effective? Why or why not?
Naily [24]
<span>Camera tilt can help you capture more of your subject in vertical terms, this can be effective when you do portraits, but sometimes ineffective when doing landscape.

Hope this helps!</span>
7 0
3 years ago
Read 2 more answers
If we develop a new policy for our environment that requires us to use complex and automatically generated passwords that are un
stepan [7]

Answer:

The answer is "Login complexity will be increased very exponentially".

Explanation:

In computer science, The password is also known as a series of characters, which allows you to use the validation process to validate any customer's privacy.  

  • It is normal usage of passwords that work together with a username to make it, it only accessible by the user, and to give the user accessibility to a computer, software or web page.
  • If the password is more complex so, it is hard to learn, and it also provides login complexity, that's why we must use a less complex password.
7 0
3 years ago
Module 7: Input and Output, 7-13d: Checkpoint
Oksi-84 [34.3K]

Answer:

F

Explanation:

6 0
4 years ago
Which unit of the computer works of the output?​
Mrac [35]

Answer:

monitor

Explanation:

this is because monitor displays information so it an output

3 0
3 years ago
Other questions:
  • Define scanning and why it’s considered one of the most important phases of intelligence gathering for an attacker. Also discuss
    10·1 answer
  • What could break the circuit between your home and an electric power plant?
    15·2 answers
  • Daniel owns a construction company that builds homes. To help his customers visualize the types of homes he can build for them,
    6·1 answer
  • In C++ Please :
    6·1 answer
  • Match each statement from the passage with the message it represents.
    10·1 answer
  • PT8 what does the word " fossil " mean
    11·2 answers
  • What is the full form of SAARC<br><br>And free point!! ​
    15·2 answers
  • Complete the procedure for creating a contact group by selecting the correct term from each drop-down menu. 1. Click . 2. Enter
    11·1 answer
  • web browsers save website information in their _________, which helps the site load faster on future visits.
    11·1 answer
  • Which directory stores the cron configuration file?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!