1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mart [117]
3 years ago
14

What laptops can you get for 2500$ and should mostly using Microsoft applications.

Computers and Technology
2 answers:
spayn [35]3 years ago
6 0
Https://www.microsoftstore.com/store/msusa/en_US/list/Gaming-PCs/categoryID.67899900?sortby=ranking%...=
Andreas93 [3]3 years ago
6 0
You can get a Msi Intel core i7-6700HQ
It has a lot of GB
You might be interested in
Blank includes websites that encourage interaction and connection among people ,business and organizations
Ira Lisetskai [31]
The answer would be social media
6 0
3 years ago
. One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is t
Komok [63]

Answer: C)report the status of individual computer users

Explanation:Morris worm is known as the program that replicates itself automatically and hides in the computer system.Because of the vulnerability of the system ,the worm worked as finger protocol for the gaining of the user information and status.

Other option are incorrect as the they are not the vulnerability factor for the Morris worm to work on it and thus finger protocols don't work on those option.Thus, the correct answer is option(c)

3 0
3 years ago
What are some positive and nevative aspects of technology?
slamgirl [31]

Answer:

Explanation:

Positive:

Enhances Learning.  

Fosters Problem-Solving Skills.  

Develops Future Technological Leaders

Negative:

Diminishes Relationships and Social Skills

Stimulates Health Issues

Reduces Sleep Quality

6 0
3 years ago
HELP PLZZZZZZ
Brums [2.3K]

Answer:

Do you want me the money for the policy that has been canceled

3 0
3 years ago
Find different between manocots and dicots clarify with example​
Fantom [35]

Answer:

hope it's help you..............

7 0
3 years ago
Other questions:
  • Which of the following would be considered a strong password?
    5·2 answers
  • What is a common method for testing a spot weld?
    13·1 answer
  • What are the problems with security when working on a Web Page?
    13·2 answers
  • All of the nested folders you created will carry the same permissions as the __________ until you make changes.
    10·1 answer
  • Microprocessors can’t directly understand programming languages, so programs have to be converted into _____________ that corres
    15·1 answer
  • You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys. The next time you log on, your screen ha
    13·1 answer
  • According to the stage-gate process developed by Robert G. Cooper, _____ are the results of the previous stage and are the input
    15·1 answer
  • . Define the process of Technological relationship
    12·1 answer
  • What would be a social networking page background for Sigmund Freud?
    15·1 answer
  • What is the best example of personally identifiable information.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!