1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alina1380 [7]
3 years ago
13

Only 2 people answer this

Computers and Technology
2 answers:
balu736 [363]3 years ago
8 0

Answer:

2

Explanation:

marysya [2.9K]3 years ago
7 0

Answer:

1

Explanation:

You might be interested in
For the following scenario, indicate whether the action is a good practice or bad practice for safeguarding your personally iden
a_sh-v [17]

Answer: it is good practice

Explanation: Even if you are able to guess the phrase that Sierra uses, you will find it very difficult to write them exactly as she does hence you cannot have access to her bank account

8 0
4 years ago
Reusing internal and external components and behaviors maintains a consistent approach
boyakko [2]

<u>Reuse:</u> reusing internal and external components and behaviors maintains a consistent approach.

<h3>What is an e-waste?</h3>

An e-waste is the abbreviation for electronic waste and it can be defined as any electrical or electronic device that have been discarded because they are no longer functional and useful.

This ultimately implies that, e-waste are generally destined for disposal, resale, reuse, refurbishment, or recycling in the long run.

However, the burning of wires from e-waste extracts the following toxic components that are hazardous to human health:

Polybrominated flame reta-rdants

  • Mercury
  • Lead
  • Barium
  • Cadmium

Read more on recycling here: brainly.com/question/25024898

#SPJ1

8 0
1 year ago
A(n) _____ is a Web address that specifies the exact location of a Web page using letters and words
Ahat [919]
A Uniform Resource Locator (URL)
5 0
3 years ago
What is often called the brain of a computer
Nookie1986 [14]

Answer:

Explanation:

The computer brain is a microprocessor called the central processing unit (CPU)

6 0
3 years ago
Which of the following are advantages of using cell protection in spreadsheets? Choose all that apply.
Y_Kistochka [10]

Answer: 1 and 2

Explanation: the answer would be both 1 and 2 like you had stated in the description.

6 0
3 years ago
Other questions:
  • Andrea wants to to install a new internet connection . she eants to use the fastest one she can find . what are the maximum spee
    14·1 answer
  • A key or combination of keys that complete an action more efficiently than using the mouse is called a(n) keyboard shortcut.
    8·1 answer
  • Which of the given original work is protected by the copyright law
    9·1 answer
  • Comparing tools made of stone, iron, and bronze: place them in the correct order from least to most durable
    14·1 answer
  • Scavenging is a form of fraud in which the perpetrator uses a computer program to search for key terms in a database and then st
    14·1 answer
  • Which snippet of code is in XML?
    5·1 answer
  • Which of the following is the fastest growing input technique​
    14·1 answer
  • What is a scholary or systemic investigation or injury about a subject?
    14·1 answer
  • What are potential problems with using nanorobots ?
    14·1 answer
  • What is TCP/IP adress​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!