1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ira [324]
3 years ago
10

( answer goes here) are pictures that you can click on to tell your computer what to do.

Computers and Technology
2 answers:
rosijanka [135]3 years ago
8 0
Um what are you asking here?
Sloan [31]3 years ago
8 0

click the icons on your screen. hope this helps

You might be interested in
Three reasons Why we connect speakers to computers
ANEK [815]
1. Some computers do not have speaker therefore we connect speakers

2. Some speakers don’t have clear audio so to fix that we connect new ones

3. What do you do if your speaker inside the computer is broken..... connect new speakers
4 0
3 years ago
Read 2 more answers
What is the single most important component of a computer? Central Processing Unit DIP Motherboard Chipset
Dominik [7]
The mother board it holds all of the storage
5 0
3 years ago
Look act the picture
VLD [36.1K]

Answer:

the answer is b

Explanation:

3 0
3 years ago
Who is katie and why is she deleting my answers
defon

Answer:

fr its so annoying when they delete your stuff when there is legit nothing wrong with the question

Explanation:

8 0
2 years ago
Read 2 more answers
Applications of kinematics in computer engineering​
uysha [10]

Answer:

There is a wide application of kinematics; it is also used in astrophysics. In mechanical engineering, robotics, and biomechanics, it is used to describe the motion of the system of the joint parts.

6 0
3 years ago
Other questions:
  • Your assignment is to write an assembly language program which read a string and print it in uppercase. This program asks the us
    15·1 answer
  • Java provides a(n) ____ class, which contains many useful methods for manipulating arrays.
    5·1 answer
  • What type of social engineering attack uses email to direct you to their their website where they claim you need to update/valid
    6·2 answers
  • ____ refers to data, applications, and even resources stored on computers accessed over the Internet. Answer
    5·1 answer
  • Which do switches create?<br> Networks<br> Wireless access points<br> Routes<br> Collision domains
    13·1 answer
  • Why do people still use Intel HD graphics for gaming?
    8·1 answer
  • The NVCC college professor receives frequent emails disguised as official business emails. They may be requests to reset a passw
    10·2 answers
  • Here is the problem specification: An Internet service provider has three different subscription packages for its customers: Pac
    5·1 answer
  • If there is a secure socket layer in place, what will you need in addition to a user id in order to access the shared files?.
    13·1 answer
  • By default word documents include _______ margins on all sides of the document.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!