1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dahasolnce [82]
3 years ago
12

Join my discord server! CODE IS (CebjBXN)​

Computers and Technology
2 answers:
11Alexandr11 [23.1K]3 years ago
7 0

Answer:

sure

Explanation:

Serjik [45]3 years ago
5 0

Answer: for among us ?

Explanation:

You might be interested in
The most common types of utility programs fall into these categories.
avanturin [10]

Answer:

file management

Explanation:

correct me if I wrong

7 0
3 years ago
What materials can I find at home and make a cell phone tower​
MAVERICK [17]

Answer:

you cant

Explanation:

You simply cant make a tower from materials found in a household

4 0
3 years ago
An IT security threat is anything that might cause serious harm to a computer system.
Blababa [14]

Answer:

True

Explanation:

this is true because a threat can endanger the computer and its system

5 0
3 years ago
Jason Chang is creating photos of his restaurant for a new website. Some of the photos of the staff have red eye, others are bad
Nadusha1986 [10]

It is okay to modify photos digitally to improve their appearance as long as it doesn't show what they aren't producing.

<h3>What is Advertisement?</h3>

This is the act of persuading people to buy goods and services and is usually done with the aid of the media.

Pictures are usually taken which have to be in the best shape and quality in order to entice people to buy the goods thereby bringing about higher sales and profit for the company.

Read more about Advertisement here brainly.com/question/1020696

7 0
2 years ago
Applications require you to provide the following basic elements : name, contact information, and availability. True or False
iren2701 [21]

True

Companies will not hire unless they know your name, availability, email, phone number, and any other legal personal information that they need to know

6 0
3 years ago
Other questions:
  • How do i move an sd card from 1 phone to another phone?
    13·1 answer
  • What is a burned edge ?
    8·1 answer
  • Help me out with this .....
    10·1 answer
  • If someone runs a red light in front of you and you choose not to slow down or steer away you will
    8·1 answer
  • Do you think<br> brain uploading<br> is a good idea?
    7·1 answer
  • List how much hard disk capacity you recommend, and write a sentence explaining why.
    8·1 answer
  • What triggers a LinkedIn account ban?
    6·1 answer
  • Memory of your familiar old e-mail password may block the recall of your new password. This illustrates
    8·1 answer
  • True or False. The 'C' programming language guarantees that R0 will always contain a zero value on the ATmega328P
    6·1 answer
  • Type the correct answer in the box. Spell all words correctly. Kenny is designing a document for the employee motivation campaig
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!