1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ruslelena [56]
3 years ago
11

IPhone + iPad + iPod + iPod touch + iMac + MacBook + iBook + Apple =???

Computers and Technology
2 answers:
snow_tiger [21]3 years ago
8 0
What? Steve Jobs?? Idk
patriot [66]3 years ago
7 0

Answer:

something

Explanation:

i dont understand

You might be interested in
Which program or security application prevents access between a private and trusted network, and other untrusted networks?
zavuch27 [327]

The answer is a firewall. A firewall is capable of blocking unwanted and/or unauthorized connections from accessing either your computer or your entire network thereby resulting in data loss and information theft.

7 0
3 years ago
Read 2 more answers
Which library research databases include information about articles published in magazines, journals, and newspapers? question 1
Alecsey [184]

Answer:

periodical databases

Explanation:

Among the various databases you can now access in a library, the periodical databases contains the text and other information about articles published in magazines, journal and newspapers.

This database allows you for example to easily search for all articles written about a specific event or person, and it will return you the list of articles you can then read from a single spot, no matter where or when the article was written.

8 0
3 years ago
Possible consequences for plagiarism, listed in CAVA's Academic Integrity Policy, may include:
Ahat [919]

CAVA’s Academic Integrity Policy refers to Calfornia Virtual Academic’s policy book for students of their schools, which are public charter schools in the state of California.

In the handbook, it is mentioned that students who commit plagiarism will be required to re-submit the assignment during the first offence; will receive a fail grade for the assignment during the second offence; and will be withdrawn from a course or even the school during the third offence.

Thus the answer to the question is (D) all of the above.

8 0
3 years ago
What is the different between the patch Tool and the Headling Brush tool?​
KonstantinChe [14]

Answer:

Explanation:

The Healing Brush and Patch tools add extra features. They match the texture, transparency, lighting, and shading of the sampled area. Instead of replacing them, pixel for pixel, like the clone stamp. This causes the painted pixels to blend seamlessly into the rest of the image. Using the Healing Brush tool: 1. Select the Healing Brush tool in the toolbox.

7 0
3 years ago
Malware is any malicious software installed on a computer or network without the owner’s knowledge.
Naya [18.7K]

Answer: True

Explanation: Malware is literally short for malicious software. The name that is given to any type of software that could harm a computer system or collect a user's data.

Hope it helped please mark as brainliest!

8 0
3 years ago
Other questions:
  • what properties are associated with all Microsoft Office files and include author, title, and subject
    5·1 answer
  • A friend complains that she is always running out of money even though she “never buys anything expensive.” What advice would yo
    10·1 answer
  • The ______ is the information center that drivers need to refer to when they're NOT scanning the road.
    13·1 answer
  • How to revert a dismissed javascript popup alert box in chrome?
    5·1 answer
  • Which one of these do not belong on the Do's list in Helpful Hints when preparing a presentation: Which one of these do not belo
    8·1 answer
  • Which of the operating systems listed below is not proprietary?
    8·1 answer
  • I need help answering these questions!
    11·1 answer
  • 1. What is Java SE?
    11·2 answers
  • Brainliest for whoever adds me on snap<br> gianavaughn007
    15·2 answers
  • While reviewing system logs, a security analyst notices that a large number of end users are changing their passwords four times
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!