1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya692 [45]
4 years ago
8

PPPLLLLEEEEAAASSSSEEEEE HHELLP me.Does anyone know how to copy an image onto a thing so i can post a real question on brainly. b

ut i need the image so others can answer my questions.
Computers and Technology
2 answers:
Kitty [74]4 years ago
8 0
If you're using a computer, you can take a picture on a camera, copy the picture to your computer to upload to Brainly.

If you're using a phone, you can easily upload pictures in the brainly App when you ask a question! just hit the camera button on the bottom left.
Inga [223]4 years ago
7 0
I use a thing called "Snipping tool"

Just type it into your search bar and download it it's free I got it from my teacher and you click on it press New...Then you hold the click button on the question and BAM save it and press "Ask a Question" Then press paperclip and there ya go just look for the Captured image and your all set
You might be interested in
45, 78, 23, 12, 63, 90, 38, 56, 88, 15 Using the sequential search as described in this chapter, how many comparisons are requir
Alecsey [184]

Explanation:

By using the sequential search we find the following results.

  • The first key is 90 and its comparison number is 6.
  • The second key is 14 and its comparison number is 10.
  • The third key is 45 and its comparison number is 1.
  • The fourth key is 23 and its comparison number is 3.
  • The fifth key is 5 and its comparison number is 10.
8 0
3 years ago
Print "Censored" if userInput contains the word "darn", else print userInput. End with newline. Ex: If userInput is "That darn c
Alisiya [41]

Answer:

The Java code is given below

Explanation:

import java.util.*;

public class CensoredWords {

public static void main(String args[]) {

Scanner scnr=new Scanner(System.in);

String userInput;

System.out.println("Enter String: ");

userInput=scnr.nextLine();

int res=userInput.indexOf("darn");

if(res == - 1) {

System.out.println(userInput);

} else {

System.out.println("Censored");

}

}

}

8 0
4 years ago
Technician A says in computer language a 0 or 1 is called a bit. Technician B says in computer language a 0 or 1 is called a byt
pochemuha

Answer:

Technician A is right 0 or 1 is called a bit

Explanation:

In computer language, Binary system is used in which data is shown either as 0 or 1.

A bit can hold either 0 or 1.

A byte can hold 8 bits of information.

Normally we use byte to represent computer storage.

A Kilo Byte (KB) can hold 1,024 bytes of information or 1,024*8 = 8,192 bits

A Mega Byte (MB) can hold 1,024*1,024 =1,048,576 bytes

or 1,048,576*8= 8,388,608 bits

Hence 0 or 1 is called a bit not byte therefore, Technician A is right!

8 0
4 years ago
How do you hack a iPhone, Like If you forgot your password and want to get back in your phone. What do you do?
s344n2d4d5 [400]

Answer:

fix it on itunes

Explanation:

or get a new one

6 0
3 years ago
Read 2 more answers
Wat kind o mouse pleese hep meh​
Trava [24]

Answer:

It's is a razer Basilisk

4 0
4 years ago
Other questions:
  • Imagine that you are an independent filmmaker making a feature-length narrative film in the United States, with a variety of bot
    11·2 answers
  • Let's say you're creating a search stream in your hootsuite dashboard, to find mentions of the phrase vacation holiday getaway.
    15·1 answer
  • Who does Electronic waste (E-Waste) effect
    14·1 answer
  • people illegally download music over the internet although it's free it it is still illegal what do you choose to do? why
    11·1 answer
  • 13 POINTS! Which option is used to ensure the integrity and authenticity of a Word document but requires additional services to
    6·2 answers
  • Which one of the following UNIX utilities is purpose-built to quickly return the location (filepath) of files by querying a data
    15·1 answer
  • A class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is pu
    11·1 answer
  • The four smallest numbers (40 points) Write an ANNA assembly program (smallest_four.ac) that finds the four smallest numbers ent
    11·1 answer
  • GIVING 50 POINTS!
    6·2 answers
  • Apart from mATX and ATX what are the other form factors of power supply
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!