1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ruslelena [56]
3 years ago
11

IPhone + iPad + iPod + iPod touch + iMac + MacBook + iBook + Apple =???

Computers and Technology
2 answers:
snow_tiger [21]3 years ago
8 0
What? Steve Jobs?? Idk
patriot [66]3 years ago
7 0

Answer:

something

Explanation:

i dont understand

You might be interested in
Hypertension occurs when blood pressure is too high.
Ivan
True, hypertension is when your blood pressure is to high.
Please mark as brainliest
8 0
3 years ago
D. The 7-bit ASCII code for the character '&' is:
insens350 [35]

Answer:

00100110

a and d are invalid sequences because they contain an even number of 1's.

Explanation:

Odd parity means that you want an odd number of 1's in the resulting set of bits. Since there are 3 (=odd) bits in the set, a zero must be added to keep the total odd.

6 0
4 years ago
Jan pays $70 each month for her auto insurance policy. this regular payment is called a: co-pay, deductible, premium, claim?
balu736 [363]
Co-pay: Term often used in health care, insurance covers part of the cost and you pay the rest. Seeing in this situation you are paying for the insurance itself, the term is not correct. 

Deductible: An insurance term for when you have to pay a certain amount before insurance will cover the rest. 

Premium: A fee payed by the insured (Jan) to be covered. This is my best guess for your answer.

Claim: A claim is when Jan would request the insurance company to reimburse her after a car accident (or her tires got slashed, etc.)
3 0
3 years ago
The Linux operating system is an example of Group of answer choices free-market software. open-source software. pirated software
MrMuchimi

Linux is one of the most prominent examples of free and open-source software collaboration. The source code may be used, modified and distributed commercially or non-commercially by anyone under the terms of its respective licenses, such as the GNU General Public License.

3 0
2 years ago
One popular hacking tool is key-logging software. <br> a. True <br> b. False
Tamiku [17]
True. It would reveal to an attacker sensitive information the victim types in, such as passwords and credit-card numbers.
7 0
3 years ago
Other questions:
  • Make sure to read all of these specifications carefully. Write a function, named array_shifter, that accepts an array of doubles
    12·1 answer
  • Why computer is known as versatile and diligent device ?explain​
    14·1 answer
  • Ead the following scenario and then answer the question.
    10·1 answer
  • Your website is currently at position 5 in organic search. On a monthly basis you currently get on average 5,432 clicks and 32 c
    7·1 answer
  • Which of these jobs would be most appropriate for someone who majors in computer engineering? ANSWER FAST PLEASE
    15·2 answers
  • What are informational sessions?
    15·1 answer
  • Why are you unable to modify the budget file, when you have the allow full control ntfs permission?
    5·1 answer
  • Universal Container wants to understand all of the configuration changes that have been made over the last 6 months. Which tool
    15·1 answer
  • When planning your App what difficulties did come across and why?
    5·2 answers
  • Which of the following should be clicked to open Backstage View?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!