1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Basile [38]
3 years ago
5

I gift points!!!!!! Come on!!!!!!!

Computers and Technology
2 answers:
Yanka [14]3 years ago
6 0

Answer:

hey jdjddjdjdj

Explanation:

djjdjd

pogonyaev3 years ago
3 0

Answer:yesss

Explanation:

You might be interested in
Java what are synchronized functions.
adelina 88 [10]

<h2>answer:</h2>

Synchronized method is used to lock an object for any shared resource. When a thread invokes a synchronized method, it automatically acquires the lock for that object and releases it when the thread completes its task.','.

4 0
3 years ago
a solid state drive is a removable flash memory device that you insert and remove from a slot in a computer, mobile device, or c
yulyashka [42]
It is true, Because all the the drives or memories which doesn't have a plates spinning like hard disk are called solid state drives.
4 0
3 years ago
What is co-operating process
Greeley [361]

Answer: A process is independent if it cannot affect other process or be affected by it

Explanation:

3 0
4 years ago
What is the best data type for traveling day?
kykrilka [37]
Here if its wrong sorry

7 0
2 years ago
Which domain of an IT infrastructure primarily includes the processes and procedures that end users use to remotely access an or
Natalka [10]

Answer:

The answer is "Remote Domain Access".

Explanation:

It is also known as web access, it is an opportunity to moderately access a desktop or network over a connection to the internet. It also allows you to download the structures, that want even if they are not mentally and emotionally able to communicate specifically.

  • In other words, it uses a satellite for interaction or internet service, and users can access systems remotely.
  • It is also used in the database, that's why it is the correct answer.
6 0
3 years ago
Other questions:
  • Name three types of data stored on a computer’s hard disk
    11·1 answer
  • What do you call an unsolicited email message that masquerades as coming from a legitimate sender, and attempts to get you to di
    11·1 answer
  • Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (a
    14·1 answer
  • Apex
    5·2 answers
  • Write a valid HTML + Python page that will count numbered from 1 to 1,000,000?​
    9·1 answer
  • Your organization has an Active Directory domain. One of the users, Bill, should not have read access to a folder named Accounti
    8·1 answer
  • Which of the following is not a language commonly used for web programming?
    8·2 answers
  • Management information system by different outhors<br>​
    10·1 answer
  • Please list 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.
    12·1 answer
  • you manage a network that has multiple internal subnets. you connect a workstation to the 192.168.1.0/24 subnet. this workstatio
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!