1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ulleksa [173]
3 years ago
8

I want to know why almost every single "expert answer verified" thing I come across is wrong. If it's wrong, why the h is it exp

ert verified. Don't trust them. Go for the answers that have good ratings and a high number of thanks.
Computers and Technology
2 answers:
Sergeu [11.5K]3 years ago
6 0

Answer:

no their right, BUT SCHOOLS AND ONLINE WEBSITES WANNA MAKE IT MORE DIFFICULT SO ITS NOT THE RIGHT ANSWER LIKE BRUH C'MON SCHOOLS

Explanation:

Studentka2010 [4]3 years ago
3 0

Answer:

Because people just give out the verified things to the first person to answer their question

Explanation:

You might be interested in
List seven basic internet components found in a computer tower
Alexxandr [17]
A Mouse and a Keyboard are examples of eternal input devices. The monitor, printer, speaker and Fash drive are all external output devices. Seven basic internal components in a computer tower are the power supply unit, central processing unit, hard disk drive, RAM modules, motherboard, video card and a sound card.
8 0
2 years ago
Read 2 more answers
What 7×8×(16÷2)?????
Eva8 [605]
448
divide 16 and 2 and you get 8 and then
8×8×7= 448
3 0
3 years ago
Knowledge and experience help you
Zarrin [17]

Answer:

yes it can it shows u what you did wrong or what you did right

Explanation:

brainlet me please

8 0
3 years ago
1. Go to a popular online electronic commerce site like Amazon. Place several items in your shopping cart, and then go to check
MakcuM [25]
On Amazon.com, I found that there are a few cryptosystems and protocols in place. The most interesting thing I found was that there were 12,292 blank lines of code before anything was actually written. Amazon ensures a secure transaction by encrypting the users information on the users end, and then decrypts their information on their end.
7 0
2 years ago
An application programming interface (API) is ________. (1 point) the code the application software uses to take advantage of co
aev [14]

Answer:

an interface

Explanation:

(API) is an interface that defines interactions between multiple software applications or mixed hardware-software intermediaries.

8 0
3 years ago
Other questions:
  • One of the earlier applications of crypto-graphic hash functions was the storage of passwords to authenticate usersin computer s
    13·1 answer
  • Calculate the shear stress (lbf/in^2) for a given normal stress (lbf/in^2) that is applied to a material with a given cohesion (
    15·1 answer
  • An important safety precaution you should take before starting any electrical servicing job is to make sure that your
    15·2 answers
  • With respect to PERT and​ CPM, slack A. is a task or subproject that must be completed. B. marks the start or completion of a ta
    9·1 answer
  • What function(s) does an interpreter perform with the instructions in a high-level programming language?
    11·1 answer
  • Within a word processing program, predesigned files that have layout and some page elements already completed are called
    8·1 answer
  • Creation of ____________will help you to study the behavior of the real system
    11·1 answer
  • Look at the options below. Which one is a simulation?
    15·1 answer
  • Tabs are usually set ________ to the right of the left margin.
    10·2 answers
  • balance exercises used for introducing balance training should initially involve little joint motion and improve what type of co
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!