1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
3 years ago
13

What should be used to keep a tablet dry?

Computers and Technology
1 answer:
Firlakuza [10]3 years ago
5 0

Answer: A duster so it won't be wet

Explanation:

You might be interested in
Which statement best describes the purpose of the Insert Function dialog box?
defon

Answer: b) it is used to insert a specific function by selecting it from the insert function list.

7 0
3 years ago
Can you please help me? I give you a brainlest <br>! ​
nlexa [21]
1.
2.satin stitch
3.lazy daisy stitch (detached chain )
4.chain stitch
5. cross stitch
6. french knot
7.
8.split stitch
9.
10. back stitch
the others i can’t tell.
4 0
3 years ago
Internet service providers​ (isp) need to resolve customer problems as quickly as possible. for one​ isp, past data indicates th
I am Lyosha [343]
I think that the likelihood will still be 0.8 as that means that 8 out of 10 calls will be resolved within one hour so the 7 out of 10 falls within that likelihood so therefore the callers can go by that assumption and be fairly confident that they have quite a high likelihood of having their problems resolved within one hour.
3 0
3 years ago
Read 2 more answers
Do you agree that digital signatures are the best way to protect the data in question?
lutik1710 [3]

Answer:

Explained

Explanation:

Yes, I agree that digital signatures are the best way to protect the data in the date in question. A digital signature is mathematical technique used to validate the authenticity and integrity of a massage. Digital signature is far more inherent security. It is built to solve problems of tempering and impersonation of digital documents. It allows the authorized user to have authentic right, and the unauthorized person is denied access.

3 0
3 years ago
( don't answer unless you know the answer. And you have to select 2 answers not just one.) What is true about the LAB color mode
Dmitrij [34]

Answer:

B and D

Explanation:

hope this helps slang slang

8 0
3 years ago
Other questions:
  • Which of the following are possible ways to
    6·2 answers
  • What is Service Oriented architecture &amp; How is it different form Object Oriented Middleware?
    6·1 answer
  • State two functions of windows environment​
    9·1 answer
  • The false reject rate describes the number of legitimate users who are denied access because of a failure in the biometric devic
    11·1 answer
  • 1.  
    15·1 answer
  • Take the template and complete creation and ordering of the Triangular Matrix. //Complete the following Functions int**fillAry(i
    7·1 answer
  • Which type of word processing programs enables users to include illustrations within the program?
    8·1 answer
  • Ashton assigned a string value to a variable. Which program statement should he use?
    5·1 answer
  • 2. The internet offers a great source of information; however, how are
    9·1 answer
  • In your own words, explain what it means to “buy low, sell high.”
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!