1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
3 years ago
6

What type of account should you use fro signing in to your windows 8 computer if you want to synchronize your settings on other

windows 8 computers that use the same sign-in?
a. domain,
b. microsoft,
c. local,
d. windows
Computers and Technology
1 answer:
nikklg [1K]3 years ago
8 0
You should use your Microsoft account because this will sync to all your windows devices.
You might be interested in
Which of the following statements is true of licensing procedures for IT professionals?
melomori [17]

Answer:

the correct answer is b

Explanation:

4 0
3 years ago
Read 2 more answers
A byte in memory is identified by a unique number called its
Murrr4er [49]
It is identified by its address number.
4 0
4 years ago
I need answers and explanation
larisa86 [58]

Answer:

B. Run-time Error

Explanation:

You can't divide by zero in math because it could be divided by itself an infinite number of time, which is not possible.

A. Syntax error is just the 'grammar' of the code. An example could be forgetting to add a semicolon at the end of your code in C. Another example is forgetting to close brackets or quotes

<em>printf("inclomplete string      </em>WRONG, will give syntax error

B. Run-time error is an error that occurs while the program is running. This might happen because of many reasons, one of which is calculation errors such as dividing by 0.

C. I don't know what an Undetected Error is. Never hear of it.

D. Logic error is an error when a condition is not logically correct. This could be because you used the wrong type of operator.

if(a = b)   WRONG, will give logic error

if(a == b)    CORRECT

4 0
3 years ago
Hey yall! Its spoopy season! I am having a live stream on the Spoon app under the username teendragonqueen️‍ if yall wanna join!
irina1246 [14]

Answer:

im down for that

Explanation:

4 0
3 years ago
What did Sniff and Scurry find while Hem and Haw were still hesitating? What did Haw write on the wall and how does this apply t
Minchanka [31]

The thing that Sniff and Scurry find while Hem and Haw were still hesitating was a big supply of  a New Cheese.

The thing that Haw write on the wall and how does this apply to us in everyday life is  “If a person Do Not Change, they can be able to go Extinct.”

<h3>What is the thing about  Sniff and Scurry?</h3>

Sniff and Scurry were well on their way while Hem and Haw were still deciding what to do. They focused exclusively on locating New Cheese. They discovered a huge amount of New Cheese, which is what they were seeking for.

Note that Haw began to scribble words of encouragement on the walls as he made his way through the Maze, both for himself and to inspire Hem should he decide to change his mind and leave.

Learn more about Change from

brainly.com/question/25594630

#SPJ1

5 0
1 year ago
Other questions:
  • Distinguish between engineering and architecture​
    5·1 answer
  • If a user has just added a simple triangle shape into a diagram, how can the triangle be adjusted? Check all that apply. by maki
    6·2 answers
  • IF ACCURATE = BRAINLY (if u answer rubbish randomness= reported AND if you got questions dont ask in answer slot= reported)
    13·1 answer
  • Along with an ip address, a subnet mask, and a name server, the other thing required for a computer to operate on a network is a
    15·1 answer
  • Cisco Next Generation Intrusion Prevention System (NGIPS) devices include global correlation capabilities that utilize real-worl
    9·1 answer
  • int temp; temp = 180; if ( temp &gt; 90 ) { System.out.println( "This porridge is too hot." ); // cool down temp = temp – ( temp
    9·1 answer
  • . Which of the following is NOT a valid declaration for a character string?
    6·1 answer
  • Create the following SQL Server queries that access the Northwind database. Place them in a zip file and place the zip file in t
    6·1 answer
  • IF U LOVE CODING CLICK HERE!!! : )
    14·1 answer
  • Why are wiki's not secure​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!