1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya692 [45]
3 years ago
8

PPPLLLLEEEEAAASSSSEEEEE HHELLP me.Does anyone know how to copy an image onto a thing so i can post a real question on brainly. b

ut i need the image so others can answer my questions.
Computers and Technology
2 answers:
Kitty [74]3 years ago
8 0
If you're using a computer, you can take a picture on a camera, copy the picture to your computer to upload to Brainly.

If you're using a phone, you can easily upload pictures in the brainly App when you ask a question! just hit the camera button on the bottom left.
Inga [223]3 years ago
7 0
I use a thing called "Snipping tool"

Just type it into your search bar and download it it's free I got it from my teacher and you click on it press New...Then you hold the click button on the question and BAM save it and press "Ask a Question" Then press paperclip and there ya go just look for the Captured image and your all set
You might be interested in
Live footage refers to:
QveST [7]

Answer:

D

Explanation:

live refers to happening right now and footage refers to videos taken and captured.

8 0
1 year ago
The approved detail design resulting from the __________ serves as a basis for making the decision to begin production.
natita [175]
I am pretty sure, that complete answer looks like this: The approved detail design resulting from the <span>Critical Design Review</span> serves as a basis for making the decision to begin production. Critical Design Review is needed to ensure that system can meet stated performance including costs and risks.
8 0
3 years ago
Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
Alla [95]

Answer: C. File encryption

Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.

8 0
3 years ago
List any 5 Unix commands with their brief description?
AlexFokin [52]

Answer:

Commands: commands are also known as "programs" and the program is a set of rules that performs a specific task which is executed by a computer.

Unix is an operating system. that supports multi-tasking and multi-user functionality. Unix is most widely used in all forms of computing systems such as desktop, laptop, and servers. It provides a Graphical user interface similar to windows.

The Unix operating system there are various commands. The list of five Unix commands can be given as:

1) cal

2) date

3) banner

4) who

5) whoami

1)cal:

The cal command stands for calender. It displays the date.

Syntax:

$ cal

or

$ cal [[month] year]

Example:

$ cal 10 2019

2)date:

The date command stands for date and time. It displays the system date and time.

Syntax:

$date

or

$ date[+format]

Example:

$ date +%d/%m/%y

3) banner

The banner command stands for display the text in to a large size.

Syntax:

$banner message

Example:

$banner Unix

4) who

The who command stands for display the list of users currently logged in.

Syntax:

$who

or

$who [option] … [file][arg1]

Example:

$who

5) whoami

The whoami command stands for display the user id of the currently logged-in user.

Syntax:

$whoami

Example:

$whoami

Explanation:

1)cal command display the current month and year.

2)date command display system date and time.

3)banner command display text in large size.

4)who command display the user name who currently login.

5)whoami command display user id.

4 0
3 years ago
There is always this thing that comes out and I can't answer one's question. How do I undo this?
Y_Kistochka [10]
You should enter your email address
8 0
3 years ago
Read 2 more answers
Other questions:
  • PLEASE HELP
    12·2 answers
  • Noah's document was very plain and would not catch the readers' attention. Select each item below that would make
    7·1 answer
  • Select all that apply.
    8·2 answers
  • BRAINLYEST IF CORRECT!!! What is the special feature of the View Side by Side command?
    6·2 answers
  • Your boss bought a new printer with a USB 3.0 port, and it came with a USB 3.0 cable. Your boss asks you:
    7·2 answers
  • Analyze the following output public class Test{ public static void main(String args[]){ int[] x={1,2,3,4}; //here declare array
    9·1 answer
  • Write 4 types of viruses , explain them briefly.
    7·1 answer
  • g Write a function named vowels that has one parameter and will return two values. Here is how the function works: Use a while l
    9·1 answer
  • Whate is function of northe bridge<br>​
    12·1 answer
  • Really helpful, I want to get together tomorrow ,Later I will follow and make it the best answer
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!