1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
V125BC [204]
3 years ago
5

My mac book airs touch pad stopped working and i can't click. what do i do?

Computers and Technology
2 answers:
Savatey [412]3 years ago
8 0

I'd suggest going online to apple.com and booking an appointment at the Genius Bar, where one of the Apple employees will have a look at it. Chances are though, they'll probably rip you off, but it's your safest bet.

julsineya [31]3 years ago
7 0
Get it in to be fixed
You might be interested in
Which rock band apologized for automatically adding its new album to every iPhone 6 in 2014
Naya [18.7K]
Hey there!
This was done by the band U2.
It's actually gotten quite annoying, and it's yet to be removed.
Hope this helps!
8 0
3 years ago
Read 2 more answers
To insert a clip art you must do the following
Elis [28]

In word (.docx) or powerpoint (.ppt), one can insert images. These images may come from the internet online and other avenues for inserting images. If one does not have internet at home, he could opt to using the ‘clip arts’ where you click ‘Insert’ in the home bar up, and click clip art.

<span> </span>

5 0
3 years ago
PLEASE HELP! I accidently looked up a link, and now this same link keeps popping up everywhere, how do I stop this!?!? please he
Black_prince [1.1K]

Answer:

Try restarting your phone

Explanation:

8 0
2 years ago
Read 2 more answers
You are given a graph G = (V, E) with positive edge weights, and a minimum spanning tree T = (V, E’) with respect to these weigh
matrenka [14]
C vraiment très facile
Si tu a besoin d’aide recontacter moi
7 0
3 years ago
IP ______ occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.
Veseljchak [2.6K]

Answer:

Spoofing

Explanation:

Spoofing that occurs when an intruder computer fools network into believing its IP address is associated with trusted source

5 0
2 years ago
Other questions:
  • Which cloud computing service model gives software developers access to multiple operating systems for testing?
    5·1 answer
  • ____, developed by xuejia lai and james massey, is a block cipher that operates on 64-bit blocks of plaintext.
    10·1 answer
  • Charli's password was changed a couple of weeks ago because someone figured it out. Can someone go to a password generator and f
    5·2 answers
  • What do you call the spreadsheet cell that is in effect and has a heavier black border around it?
    7·2 answers
  • Who distributes IP Address?
    10·1 answer
  • A vacuum tube that contains a grid can be classified as a A. rectifier B. triode C. pentode D. diode
    12·1 answer
  • the ghost adventures team uses a variety of tools and technology in investigations. which one is described as an adjustable freq
    9·1 answer
  • What bonnie is this? From five night at freddys
    9·1 answer
  • How to clear a function in functional component react.
    6·1 answer
  • A field value is currently not in any group. what happens when you try adding it to an existing group?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!