1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dangina [55]
3 years ago
14

My computer just fried anybody know why it did that?

Computers and Technology
2 answers:
agasfer [191]3 years ago
8 0
Could be it over heated... that is what happened with mine once. 
pochemuha3 years ago
7 0
You was probably was too MLG and it blew its top my boy !
You might be interested in
Which of the following best describes
Nookie1986 [14]

Answer:

answer is a spreadsheet

7 0
3 years ago
How does this splitting wedge make work easier?
Pavlova-9 [17]
The believe that the best answer among the choices provided by the question is D) changes the direction and amount of applied force

Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.
3 0
3 years ago
The word ____ at the end of several of the member functions in the accompanying class definition specifies that these functions
aalyn [17]

Answer:

Const.

Explanation:

In C++ programming language, if you wish to have your compiler deny or prevent access to a member function in modifying (changing) a calling object's private member variables in a line of code, you should declare the member as a const function. Therefore, the member function is simply declared as a constant by the compiler.

The word const at the end of several of the member functions in the accompanying class definition specifies that these functions cannot modify the member variables of a clockType object.

4 0
3 years ago
Interactive sites where users write about personal topic and comment to threaded discussion are called?
uranmaximum [27]
The answer is B. Blogs

4 0
3 years ago
Read 2 more answers
What is the name of the virus that appears to be a legitimate program but when opened
vivado [14]

Answer: trojan horse virus

Explanation:A trojan horse is a non-replicating program that looks legitimate, but it is actually used to perform malicious and illicit activities when launched. Attackers use trojan horses to steal a user's

personal information like password information, or they may simply use it to destroy programs or data on the hard disk.

6 0
3 years ago
Other questions:
  • What is the f(n) runtime of the following pseudocode: sum-0 for A = N/2 downto 1 for B-1 t increment sum by B Explain: exactly w
    13·1 answer
  • The project started the development of inter-network connections using tcp/ip that has evolved into the internet today.
    5·1 answer
  • Which of the following patterns of cell phone use can be observed in this chart
    12·1 answer
  • Which part(s) of CAIN is realized through the use of message digest functions and hashes?
    14·1 answer
  • For demultiplexing a UDP socket is identified by:_____.
    15·1 answer
  • A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
    5·1 answer
  • 50 POINTS!!!!!!!!!!!<br><br> Give at least two examples of how the transport layer is used.
    13·2 answers
  • Vanessa is a set designer. She is working on a period film set in Egypt. She has selected several items for a scene in a palace.
    7·2 answers
  • Business use a fax cover sheet is to
    12·1 answer
  • How does your ability to correctly count change affect the impression the customer has of you?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!