1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ryzh [129]
3 years ago
15

Firefox, Chrome, Opera, and Safari are examples of

Computers and Technology
1 answer:
MrRissso [65]3 years ago
3 0
D. Browsers

You're on one right now! :)

You might be interested in
What makes jambinai so unique (it’s for band)
Rus_ich [418]

Answer:

Jambinai combines Korean folk music instruments and rock music instrumentation, which creates a different music style.

7 0
2 years ago
How do you change the desktop background in the macos mojave operating system?
sleet_krkn [62]

Answer: Click the System Preferences icon on the dock. In the first row, click Desktop & Screen Saver.

Explanation: When it comes to macOS versions, Mojave and High Sierra are very comparable. The two have a lot in common, unlike Mojave and the more recent Catalina.

8 0
1 year ago
Taking these steps will help to improve the delivery of your presentation.
NNADVOKAT [17]

Taking any/all of these steps will help to improve the delivery of your presentation:

<em>==> Be familiar with the place the presentation will be given.</em>

<em>==> Practice your presentation.</em>

<em>==> Move away from your computer frequently while speaking, and return to it to advance slides.</em>

<em>==> Use your conversation words and voice.  Don't read it from a paper (unless you can write in conversational words and phrases, but this is really hard to do).</em>

<em>==> Look around the audience while you're talking.  Make eye-contact with people. </em>

<em>==> Let your hands move normally while you talk.  Smile.</em>

-- Read from your slides so you don't forget your content.   ==> No. This is considered one of the signs of a poor presentation, and an inadequately prepared presenter.  

You're not there to read the slides to your audience.  They can read the slides just as well as you can.  You're there to explain, embellish, enhance, and enlarge the material on the slides.  If you don't have any more to tell them except what's on the slides, then you don't even need to drag yourself or the audience through the agony of the presentation. Just print the slides onto a handout, hand it out, dismiss the audience, and take the rest of the day off.  

Also, you're expected to know your subject well enough so that you don't need to read your slides to know what you're talking about, and to be well enough prepared to remember what comes next.

5 0
3 years ago
Read 2 more answers
Which securities protect data through processes, procedures,decisions,and user pernissions. Determines where and how data can be
vovangra [49]

Answer:

Data can be stored on storage devices.

Explanation:

Network security, Application security and information security are the securities that protect data. Data can be stored on storage devices such as hard disk drives, solid state drives, external hard drives, USB flash drives and SD cards etc. Hard disk drives, floppy disks and tapes store data magnetically. The data can be stored with a device that spins the disk with magnetic coatings and heads has the ability to read and write information in the form of magnetic patterns.

5 0
3 years ago
What is the smallest colorable area on a display device
n200080 [17]
The smallest colorable area on a display would be a pixel 

8 0
3 years ago
Other questions:
  • "what is the name of the ipsec configuration file"
    9·1 answer
  • A loop within another loop is known as a(n) ____ loop.
    10·1 answer
  • What type of wireless connection requires an unobstructed "line of sight" between transmitter and receiver?
    8·1 answer
  • Drag each label to the correct image.
    9·2 answers
  • What does %d, , %c, %s mean and what's their difference?
    12·1 answer
  • Write a brief description of what the local authorities are recommending in the news people should do to protect themselves from
    8·1 answer
  • Write a C++ program to count even and odd numbers in array. The array size is 50. The array elements will be entered by the user
    13·1 answer
  • Giving brainliest if you answer question.
    8·1 answer
  • If you use your smartphone as a hotspot to connect to the Internet on your tablet you are using a ________.quillet
    11·1 answer
  • Different the policies and protocols in the industry
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!