1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
3 years ago
9

Want to.learn about computers​

Computers and Technology
1 answer:
MAVERICK [17]3 years ago
6 0
Yes...I do want to learn about computer
You might be interested in
Which is better PS4 or Xbox 1?
Assoli18 [71]
PS4. Period point blank.
7 0
3 years ago
Read 2 more answers
Why do we use if statements in JavaScript?
alexdok [17]

Answer:

The if statement is used to check a condition

8 0
3 years ago
Jeremy forgot where he saved a certain file on her computer. Therefore, he searches for all files with a .jpg file extension. Wh
Irina-Kira [14]
The jpg (or jpeg) extension stands for <span>Joint Photographic Experts Group. A file with this extension is an image, usually a photo. Other types of images are better stored using a lossless format.</span>
4 0
3 years ago
Read 2 more answers
Ok so this isn’t really a question that is for school but...
Nastasia [14]

Answer:

u shoud just keep it ;-;

Explanation:

5 0
3 years ago
Joe, an end-user, reports that the Windows PC he is using automatically locks when he leaves his desk and walks to a printer to
ivann1987 [24]

Answer:

A. Domain-level group policies

Explanation:

Because domain-level polices are automatically implement all users that are login on the PC and PC is connect to the domain. From domain polices you can set what user can open and what can not open, Joe Windows PC he is using automatically locks also through domain policy, Administrator set the time when any end-user leave their PC automatically after the time set administrator screen saver run and asked password of that user to return back in the windows.

6 0
3 years ago
Other questions:
  • When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise, what is
    5·1 answer
  • Which term refers to the technical structure of the software, how users interact with the software, and how the software is phys
    10·1 answer
  • Define a function CoordTransform() that transforms the function's first two input parameters xVal and yVal into two output param
    12·1 answer
  • Define a void function that calculates the sum (+), difference (-), product (*), quotient (/), and modulus (%) of two integer nu
    14·1 answer
  • How do you get the value of an element in an array? And how about for an ArrayList?
    14·1 answer
  • Some request lists might cause the disk scheduler to act the same when the three different algorithms are run. Create a request
    13·1 answer
  • You want to receive alerts if unusual activity is detected relating to the Web servers deployed in your perimeter network. What
    7·1 answer
  • Sorting Records in a Form
    12·1 answer
  • Which type of protocol allows for a secure data transmission using encryption methods?
    7·1 answer
  • Choose the correct line of code.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!