1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
3 years ago
14

Using the Internet as interpersonal communication. Find a way to

Computers and Technology
1 answer:
Tomtit [17]3 years ago
4 0

Answer:

Idk if an app is ok too but for an app there is one called monkey. my friend showed it me. you can meet a loy of new people on there. its a speed video call with everyone. I think you get 30 seconds and if you want to talk more then you just add time or add each other as friends

You might be interested in
You are trying to appreciate how important the principle of locality is in justifying the use of a cache memory, so you experime
murzikaleks [220]

Answer:

Explanation:

Attached is the solution

3 0
3 years ago
Choose all the items that represent potential ways to find a job opening.
NeX [460]

Answer:

company website

Explanation:

4 0
2 years ago
Chat messages are most likely to be found where on a computer? firewall nic internet history ram
miv72 [106K]
<span>The answer is RAM.  Chat messages are most likely to be found in the RAM of the computer.  It is Random Access Memory.  </span><span>RAM is considered volatile memory, which means that the stored information is lost when there is no more power.</span>
3 0
2 years ago
What's your opinion on Pokemon​ and pixeldip
faust18 [17]

Answer:

Its a good game but an amazing show. 10/10

Explanation:

7 0
2 years ago
Can a result that contains road maps for European countries have a highly meets rating
Mice21 [21]

Đápán3e

Explanation:

8 0
3 years ago
Other questions:
  • When doing a complex presentation, which of the following would be the best tool to begin designing your presentation?
    11·2 answers
  • What runs a network, steering information between computers and managing security and users?
    11·1 answer
  • Follow up, my brother is upset at me for stealing his robux, what should i do?
    11·2 answers
  • Can a spreadsheet be filtered only by one column at a time?
    11·1 answer
  • What allows users to connect via the Internet to its private network?
    11·2 answers
  • A(n) ____ investigation tracks all elements of an attack, including how the attack began, what intermediate devices were used du
    5·1 answer
  • . Which of the following is NOT a valid declaration for a character string?
    6·1 answer
  • Does anyone know what i did wrong?
    13·1 answer
  • Collisions occur when one output is mapped to two inputs. <br><br> A. True <br> B. False
    7·2 answers
  • Old systems can be useful when designing new computer software.<br> True or False
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!