1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrej [43]
4 years ago
13

Can someone buy me eddie van der tabs???

Computers and Technology
1 answer:
sineoko [7]4 years ago
4 0

Answer:

No

Explanation:

U cannot exploit people like that

You might be interested in
Online activities among businesses
Masja [62]

Some of the online activities among businesses are:

  • SEO consultant. ...
  • Web designer or web developer. ...
  • Blogger. ...
  • Virtual assistant. ...
  • Affiliate marketer, etc

<h3>What are Online Activities?</h3>

This refers to the various activities that are done on the world wide web and is usually used by businesses to increase visibility, and in turn, revenue.

Hence, we can see that the use of online activities by businesses are important because the products and services for sale by businesses are advertised to target audiences through some of the aforementioned activities.

Read more about online activities among businesses here:

brainly.com/question/27172895

#SPJ1

3 0
2 years ago
What is contained in the Open Files section of Shared Folders? ​
amm1812

Answer:

The contents of shared folders might include both programs and data files. Common files may be stored and accessed using shared application folders, which simplify administration and offer a single area for users to store and access common data. If all data files are consolidated in a single shared folder, users will have an easier time finding them.

Explanation:

Hope it helps:)

8 0
2 years ago
. When a system isdelivered over time, with each delivery (release) adding tothe
dexar [7]

Answer:

A. Incremental Development

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

The answer to this question is Incremental Development, this is when the development of the system is implemented little by little as time goes on. On the other hand phase development is when a development cycle is rolled out in phases such as the brainstorming phase, Construction phase, marketing , and roll out phase. Since this development doesn't contribute to the system's functionality it is not the correct answer.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
chapter tests and exams are password protected and must be taken in the lab with a universal kiosk browser
Nesterboy [21]

Yes, when a universal kiosk browser (chrome books) being used in the lab during test and exams is protected by avoiding the students to check the answers in the online.

Explanation:

Universal kiosk browser is helpful to display the content on the web on Chrome books. Chrome books are being safe to make student assessment processes. With the help of this, accessing websites to find the answer to the questions in the assessment process by the student is being avoided.

4 0
3 years ago
I need a 75 word Radio Ad on Why Technology should be kept in a schools budget.
babunello [35]

Answer:

You cant work without it

Explanation:

4 0
2 years ago
Other questions:
  • What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential infor
    7·1 answer
  • The basic input/output system (bios locates the boot loader program on a linux system by reading the __________ on the hard driv
    13·1 answer
  • What is an online reputation?
    12·2 answers
  • What happens if the addressed device does not respond due to a malfunction during a read operation?
    11·1 answer
  • How do you get a crown on this website<br> look under your points on the right side of your picture
    15·2 answers
  • Write a class called Date that represents a date consisting of a day, month, and year. A date object should have the following m
    10·1 answer
  • Lab 6B: printing a binary number
    13·1 answer
  • Language modeling incorporates rules of __. Select all that apply.
    7·1 answer
  • How does links helped a student like you in navigating the different available websites?
    5·1 answer
  • Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!