1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sidana [21]
3 years ago
14

This type of technology typically does NOT come with a keyboard or mouse for input.

Computers and Technology
2 answers:
anyanavicka [17]3 years ago
4 0
The answer is C) tablet. You use the touch screen keyboard for that.
Kay [80]3 years ago
4 0
The answer is C hoped this helped
You might be interested in
The last 64 bits of an ipv6 address are the interface identifier. what is frequently used to specify the interface identifier?
Sliva [168]
Answer: the MAC (Media Access Control) address
6 0
3 years ago
Tinh T = a1*a2*a3*...an<br><br> Giúp em với
Studentka2010 [4]

Answer:

??????

Explanation:

??????? okay okay

3 0
3 years ago
How can i promote netiquette??​
Kay [80]

Answer: Neh - tuh - ket

Explanation:

The above answer is the phonetical pronunciation of the word Netiquette which is an amalgamation of the words, Net and Etiquette and as the term implies, refers to the behavior on the internet that is socially acceptable and good so that other people are not made to feel uncomfortable.

3 0
3 years ago
Hey yall wanna send me some just ask for my phone #
GuDViN [60]

Answer:

Send you some what?

Explanation:

the answer is 12

7 0
3 years ago
One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or
Sindrei [870]

Answer:

A) hacktivist

Explanation:

According to my research on cyber security attacks, I can say that based on the information provided within the question the form on online vandalism being defined is called hacktivist operations. These are activists who hack into government or organizational systems in order to protest their policies or actions, and by doing so can severely damage their systems.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
Read 2 more answers
Other questions:
  • A network technician has configured a point-to-point interface on a router. Once the fiber optic cables have been run, though, t
    12·1 answer
  • Suppose you send data to the 11111111 11111111 11111111 11111111 ip address on an ipv4 network. to which device(s) are you trans
    15·1 answer
  • Which strategy are you using when you only read the title, section headings, and captions?
    12·2 answers
  • Assume you have just started a new job, have a car loan, and have a student loan. You have just received a cash gift of $1,000 f
    14·1 answer
  • What best describes "broadband access"? a. broadband access is a specific term used to describe the delivery of one-way televisi
    5·1 answer
  • One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but
    15·1 answer
  • You will implement three different types of FFs with two different reset types. You have to show your results on your FPGA. You
    9·1 answer
  • For enterprise servers, or servers accessed around the clock, SATA disks are preferred over SAS disks. True or False
    12·1 answer
  • The process of sending a result back to another part of the program is
    14·1 answer
  • If you give someone ______ to your device, they can control it through another phone or computer.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!