1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariulka [41]
3 years ago
11

If I dribbled on my motherboard and I used windex to clean off the spit would it still work ?

Computers and Technology
2 answers:
Vlada [557]3 years ago
8 0
Depends on how bad it is.If it is a lot it may be a problem but if its small the just use a little windex as you can.
amm18123 years ago
3 0
Probably not, I also don't think it's the best idea either.
You might be interested in
What do you understand by storage devices ? Name any two storage devices.​
MatroZZZ [7]

Answer:

Types of storage devices

Primary Storage: Random Access Memory (RAM) Random Access Memory, or RAM, is the primary storage of a computer. ...

Secondary Storage: Hard Disk Drives (HDD) & Solid-State Drives (SSD) ...

Hard Disk Drives (HDD) ...

Solid-State Drives (SSD) ...

External HDDs and SSDs. ...

Flash memory devices. ...

Optical Storage Devices. ...

Floppy Disks.

6 0
3 years ago
Read 2 more answers
)How to extract a specific element of item in a list?
pogonyaev

Answer:

List items are usually accessed using the indexing operator.

Explanation:

Depends on the language, and what you mean with extracting? Do you mean accessing or removing?

3 0
3 years ago
Whats the answer to 9? i really need help with this in the next 20 minutes. ty if u help me!
gayaneshka [121]

Answer:

A very precise number B

Explanation:

Hope you pass

3 0
3 years ago
Object Linking and Embedding (OLE) data integration allows you to
worty [1.4K]
Hey mate thanks for letting me help you

l just look into this and l got this A set of APIs to create and display a (compound) document, but that is not a choice. so <span>D. edit data in a plain text editor
</span><span>
hope l helped   
</span>
4 0
3 years ago
Which of the following devices are least likely to deny a connection inline when an attack is detected? (select 2)
user100 [1]

Answer: Option (A) & (D) are correct.

Layer 2 switch is commonly referred to as a type of network or device switch that tends to work on data link layer and use MAC addresses in order to determine the route through which the frames are forwarded.

An IDS known as intrusion detection system is commonly referred to as a device or application that controls a network for malevolent activity and its policy violations.

7 0
3 years ago
Other questions:
  • Do you believe that OOP should be phased out and we should start working on some alternative
    6·1 answer
  • He has a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, ta
    8·1 answer
  • Whenever Jim starts his laptop, he sees some commands and numbers appearing on his screen. These instructions are being processe
    12·2 answers
  • The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling int
    9·1 answer
  • The Cursor is blinking in a white area on the Screen. This area where text will appear in the ____.
    10·2 answers
  • An aircraft departs an airport in the mountain standard time zone at 1615 MST for a 2-hour 15-minute flight to an airport locate
    14·1 answer
  • Which is an aspect of structural-level design?
    6·2 answers
  • What is the biggest challenge for most business when going online?
    12·1 answer
  • A local variable that is declared as ____ causes the program to keep the variable and its latest value even when the function th
    10·1 answer
  • In the following nested loop structure, which loop does the program EXIT first?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!