1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paul [167]
3 years ago
9

How can i add card reader to pc answers?

Computers and Technology
1 answer:
EastWind [94]3 years ago
7 0
If your trying to put one in you cant with out destroying ur pc 
You might be interested in
In addition to meeting OSHA standards, the Department of Defense requires each military department, including the Department of
professor190 [17]
The correct answer is: DoD Instruction 6055.1 which is known as DoD Occupational Safety and Health Program.

<span>In addition to meeting OSHA standards, the Department of Defense requires each military department, including the Department of the Army, to administer a comprehensive safety and occupational health program. The requirement appears in this document.</span>
3 0
3 years ago
What is true about music from the Romantic period?
avanturin [10]
The answer to the given question above is the third option: <span>It was longer and less constrained than the music of the Classical period. The Romantic Period in music actually has more freedom in design and form. During this period, music were even more artistic and intellectual as well. Romantic Period occurred the late 18th century until early 19th century.</span>
8 0
3 years ago
Read 2 more answers
Hey can someone help?
Zinaida [17]
Send an email to it!
4 0
3 years ago
Read 2 more answers
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
The various online technology tools that enable people to communicate easily via the Internet to share information and resources
seropon [69]

Answer:

Social media is the correct answer for the above question.

Explanation:

  • Social media is the media that is used to communicate with the other person with the help of an internet connection. There is so much software that gives this type of facility. for example whats up and twitter.
  • The above question asked about that technology which is used to connect the people to communicate and the technology is social media which gives the features to connect and communicate all over the world with the help of the internet. Hence "Social media" is the correct answer.
8 0
3 years ago
Other questions:
  • Define binary number and decimal number with example​
    14·1 answer
  • What is the purpose of requirements gathering
    9·2 answers
  • A collection of methods that can be used by any class, as long as the class provides a definition to override the collection's a
    5·1 answer
  • 13 POINTS! Which option is used to ensure the integrity and authenticity of a Word document but requires additional services to
    6·2 answers
  • Is sprint having problems today
    11·1 answer
  • A general-use dimmer switch is required to be counted as ? where installed in a single-gang box on a circuit wired with 12 awg c
    15·1 answer
  • John is runnig his Database application on a single server with 24 Gigabytes of memory and 4 processors. The system is running s
    6·1 answer
  • Answer this correct and get brainly
    5·2 answers
  • Which types of file formats are the best choice for files that may need to be edited later?
    14·1 answer
  • Jeff wants to create a website with interactive and dynamic content. Which programming language will he use?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!