1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
3 years ago
13

What should be used to keep a tablet dry?

Computers and Technology
1 answer:
Firlakuza [10]3 years ago
5 0

Answer: A duster so it won't be wet

Explanation:

You might be interested in
When did internet came to existence?
Luden [163]
1982 the Internet protocol was introduced as the standard network protocol on the ARPANET.

1981 access to the ARPANET was expanded.
7 0
3 years ago
In which type of attack do you get malicious code in links from seemingly reliable websites?
natali 33 [55]

I think it is C. cross-site scripting

6 0
3 years ago
Write a police description a person who know you well​
SIZIF [17.4K]

Answer:

I will be describing Jude. He is a neighbor.

Explanation:

A police description refers to the method of describing a person using high-level detailing. An example is given below:

  1. He is a Five feet-three male caucasian
  2. With brown eyes and
  3. an Australian accent
  4. He has a military haircut
  5. About 38 years
  6. Weighs about 95Kg
  7. and dresses casually
  8. he walks with a slant to the left
  9. a dove tattoed at the back of his neck
  10. and a birthmark on his left ear lobe

Cheers

3 0
3 years ago
Jeff is a financial assistant. He needs to create a document for his client that tracks her stocks and calculates the loss or ga
seropon [69]
Spreadsheet. Brainliest answer plz??
4 0
3 years ago
Read 2 more answers
What is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowle
Stells [14]

Answer:

The answer is "Spyware".

Explanation:

Spyware is a supplementary program that is mounted on your customer computer and it transmits the data without authorization via the Internet. Its business includes ads, private data, and improvements in the user interface, which is why it has become recognized as the special adware class that collects and transmits user information over the web without the user's permission.

7 0
3 years ago
Other questions:
  • What is computer ????
    11·1 answer
  • Why has unicode become the standard way of converting binary to text
    7·1 answer
  • Write a Python program that translates a binary number of n bits to a decimal number. Your program should first ask the user the
    8·1 answer
  • Although some families have more resources than other families, there is always a limited amount of resources that families have
    15·2 answers
  • Discuss the difference between a broad internet search and a narrow internet search?
    12·2 answers
  • What major criteria must a product or process meet in order to be considered emerging technology?
    7·1 answer
  • Coal, nuclear and natural gas power plants all transform thermal energy into electricity
    14·2 answers
  • 1. This tab displays the related commands which are grouped as Pages, Tables, Illustrations, Links, Header and Footer, Text, Sym
    13·1 answer
  • Actividades que puedes Aser con un martillo y su explicación
    8·1 answer
  • You want to add a caption to a table. which tab contains this option?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!