1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
posledela
3 years ago
13

Ben pays his mobile bills, watches movies, and shops online using the Internet. Which internet activity does he perform?

Computers and Technology
2 answers:
Genrish500 [490]3 years ago
7 0

Answer:

all three

Explanation:

Mumz [18]3 years ago
4 0

Answer:

ALL

Explanation:

You might be interested in
A ___________ is the smallest unit in a written language.
Delvig [45]
A. string? maybee its a string of units


8 0
3 years ago
Read 2 more answers
What is the use of "Computer" Icon ?
snow_lady [41]




Hi pupil Here's your answer :::




➡➡➡➡➡➡➡➡➡➡➡➡➡



The Computer Icons can provide access to the resources on your computer. You can access your storage drives and by double clicking on the Computer icon.

It usually used in a Graphical User Interface systems.



⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅




Hope this helps
7 0
3 years ago
Read 2 more answers
The concept of _________________ comes from the acknowledgment that data changes form and often gets copied, moved, and stored i
saveliy_v [14]

Answer: data loss protection

Explanation:

In any organization or enterprise it is very essential to provide protection from data loss to avoid breaches by unauthorized accesses and to secure the data irrespective of whether it is in rest or motion.

It is known that data changes its form when it is copied, moved and stored in different memory location so in this process a lot of sensitive data might be exposed to the outside world and left into the hands of the unauthorized for easy of access to it.

So once a security breach is possible through the system or into the network of the organization it would expose all the application database, emails, spreadsheets and the personal workstation files. So in such a scenario the importance of data loss protection is highlighted and must be given due importance.

8 0
3 years ago
Less than 40 percent of teens have used marijuana within the past year. True or false?
fgiga [73]
That is true. I hope this helps
6 0
3 years ago
6. Why did he choose to install the window not totally plumb?
Dmitriy789 [7]

Answer:

Because then it would break

Explanation:

You achieve this by obtaining correct measurements. When measuring a window, plumb refers to the vertical planes, and level refers to the horizontal planes. So he did not install the window totally plumb

8 0
3 years ago
Other questions:
  • In microsoft windows when a window is minimized what happens to that window
    9·1 answer
  • Markaplier nand jackceptieye are the best YT ever who agrees
    5·2 answers
  • Managing your calendar and emails can be easily accomplished through ___ software
    8·1 answer
  • Write a program that does the following:
    11·1 answer
  • 次のうち、ビジネスレターに適したフォントとポイントサイズの選択はどれですか?<br> 私を助けてください!私はあなたを最高にブランコにします!
    12·2 answers
  • How do I keep my computer and data safe and secure while using the Internet?
    14·2 answers
  • Add the following method to the Point class: public double distance(Point other) Returns the distance between the current Point
    12·1 answer
  • Which model represents any process in general?
    6·1 answer
  • Difference between private and confidential data?​
    5·1 answer
  • Select each of the steps involved in creating a table in a presentation.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!