1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANTONII [103]
3 years ago
10

How do people interact with chromebooks

Computers and Technology
2 answers:
geniusboy [140]3 years ago
8 0

It is a laptop so they are able to take them with them whit them they are the most potable laptop able over any apple product you can get in the same category

iVinArrow [24]3 years ago
8 0
It’s a laptop you can pretty much use it anywhere
You might be interested in
he is trying to find information on the internet first he navigated to a search engine entered the keywords database administrat
Vlada [557]

Answer:

b

Explanation:

b

6 0
3 years ago
Which is a color group in color theory?
prohojiy [21]

Answer:A color circle, based on red, yellow and blue, is traditional in the field of art. Sir Isaac Newton developed the first circular diagram of colors in 1666. ... In traditional color theory (used in paint and pigments), primary colors are the 3 pigment colors that cannot be mixed or formed by any combination of other colors.

Explanation:

5 0
3 years ago
_________values are stored as the number of seconds since the unix epoch (35 POINTS)
Nataly_w [17]

Answer:

he Unix epoch (or Unix time or POSIX time or Unix timestamp) is the number of seconds that have elapsed since January 1, 1970 (midnight UTC/GMT), not counting leap seconds (in ISO 8601: 1970-01-01T00:00:00Z).

Explanation:

The answer above is from a secure website

3 0
3 years ago
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
uysha [10]

Answer:

Security Tab is the correct answer.

Explanation:

The Security Tab will enable the users to authorize anyone to use that file or directory.Many clients deleted the security tab because After that nobody can alter the security privileges on the device.

  • With the help of the Security tab, we will minimize the ActiveX attacks on Internet Explorer. This option is available in the Internet Options of the dialog box.
  • Other options are incorrect because they are not related to a given scenario.
8 0
3 years ago
As you draw a star, pressing the shift key while you drag increases the number of points on the star. True or false
stepan [7]

Answer:

true

Explanation:

3 0
3 years ago
Other questions:
  • I want to make a if else statement where I want to make a message. If the input are letters (which it’s not supposed to) then I
    14·1 answer
  • Heeeaaaalp please!!!!
    15·2 answers
  • Which of the following is a bad password? Select one: a. The acronym for the title of your favorite song plus the year it came o
    11·1 answer
  • To answer the research question "How am I going to find the information I need on the tople?" the best thing Georgia should
    15·1 answer
  • (Game Design) Creating and manipulating data structures is one of the primary functions of a development environment.
    12·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
  • Identify an advantage of the software as a service (SaaS) approach in public cloud computing. Group of answer choices The user h
    5·1 answer
  • Write a function header for the ZooAnimal class member function daysSinceLastWeighed. This function has a single integer paramet
    10·1 answer
  • Company Wizzy is having trouble with network security. Issues with authentication, viruses, malware/spyware, and other network i
    12·1 answer
  • Dates of birth were entered into a computer program . The data was stored in the format DAY/MONTH/YEAR.The program rejected this
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!