1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
5

Need help with these

Computers and Technology
1 answer:
Katena32 [7]3 years ago
5 0

<em>19: </em>True

<em>~~~~~~~~</em>

<em>20: </em>B

<em>~~~~~~~~</em>

Hope this helps! :)

You might be interested in
You need to immediately terminate process id 2129. which command should you use?
kolezko [41]
<span>The kill -9 2129, kill -s KILL 2129, or kill -KILL 2129 commands</span>
8 0
3 years ago
Hey plz help me with this<br>What is malware short for?​
soldier1979 [14.2K]

Answer:

Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists of code developed by cyberattackers.

Explanation:

4 0
3 years ago
Which is a feature of a search engine? stores web pages belonging to a single website displays web pages within a browser finds
faltersainse [42]
Finds web pages that matches key words
8 0
3 years ago
Since the 1970s, local tv newscasts have developed a similar look. that's because
professor190 [17]
<span>(news doctors, consultants) said people should be young, attractive, smile and look happy.</span>
6 0
4 years ago
Mail merge requires an MS Word document in order to work.<br><br> True<br> False
Kipish [7]

True is correct. Hope it helps


3 0
3 years ago
Read 2 more answers
Other questions:
  • Your license can be canceled if you __________
    14·2 answers
  • What does it mean to say that two variables are negatively correlated?
    6·1 answer
  • What are three ways you cite evedince
    5·2 answers
  • A key physical design element is the ____, which describes how users interact with a computer system
    11·1 answer
  • PLEASE HELP!! WILL MARK BRAINLIEST!!
    15·1 answer
  • What are the main features cyber law of Nepal​
    13·1 answer
  • The merge and center
    14·1 answer
  • Question: 11
    10·1 answer
  • Structured query language (sql) enables data analysts to _____ the information in a database.
    7·1 answer
  • What are three ways of verifying legitimate right of access to a computer system?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!