1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kruka [31]
4 years ago
13

HELPPPPPPP PLZZZZZZ

Computers and Technology
2 answers:
noname [10]4 years ago
6 0
A. You need to be carful for those
Amiraneli [1.4K]4 years ago
6 0
The answer to this question is a
You might be interested in
What option would fit the most content on a page?
zvonat [6]

Answer:

normal margins will fit the most content on a page

7 0
2 years ago
What are listed in the vertical columns across the top of the Event Editor?
jeka57 [31]

Answer:

a

Explanation:

7 0
4 years ago
Read 2 more answers
An example of an "external brain" is:
mojhsa [17]

<u>Answer:</u>

<em>Organize things </em>

<u>Explanation</u>:

It is the <em>duty and power of external brain to Organize ideas</em>. Per day we may have plenty of works to be done. So we start thinking about <em>one by one and finally we try to sort out and organize how to perform, when to do and what is the first and last task etc. </em>

It is the external brain which is helping us to figure it out. But there are certain times where we <em>dump things together</em>, especially when there is an very important like marriage of our family member, where they <em>give lots of responsibilities. </em>

<em>At that time, we have very limited time to work out things and we dump our external brain. </em>

7 0
3 years ago
Read 2 more answers
0010 0000<br> What is the binary decimal
Degger [83]

Answer:

The decimal number is 32 and the Hexidecimal  is 20

5 0
3 years ago
Read 2 more answers
Please explain what steps you will take to prevent hackers from getting access to your personal information.
yuradex [85]
The steps I would take are 1. Making a strong password with symbols and numbers. 2. I will set up a 2 way authentication ther for if someone would be trying to hack me I would get an alert in order to stop the attempt. 3 I will not use the same password each time.
4 0
3 years ago
Other questions:
  • What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
    11·1 answer
  • A network in which communication passes from one person to another in a sequential pattern rather than being shared among member
    6·2 answers
  • hey computor guys. is the MSI B250M GAMING PRO LGA 1151 Intel B250 HDMI SATA 6Gb/s USB 3.1 Micro ATX Motherboards - Intel compat
    8·1 answer
  • Felicia has been having problems with her computer. Her documents won’t open, her computer is running slow, and programs automat
    7·1 answer
  • You suspect that an attacker has hidden files on your machine. What Linux command would you use to search for files with a file
    14·1 answer
  • A(n) _______ is a distributed networking architecture, residing on one or more computers, where one program requests a resource
    14·1 answer
  • Assume that two int constants,FIRST_YEAR and LAST_YEAR have already been declared and initialized with year values (like 2009, 2
    9·1 answer
  • 4. Word Separator:Write a program that accepts as input a sentence in which all of thewords are run together but the first chara
    10·1 answer
  • Which of the following operating systems would allow a user to add functionality and sell or give away their versions?
    8·1 answer
  • What message did vera mukhina convey in her work entitled the worker and the collective farmworker?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!