1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
8

Does anyone have any suggestions on how to teach my grandma to use her tablet? She always complains when it says not responding.

:/
Computers and Technology
1 answer:
spayn [35]3 years ago
8 0
Try to explain slowly and with patience it takes time because she isn't used to it
You might be interested in
Using a linear search to find a value that is stored in the last element of an array of 20,000 elements, ________ element(s) mus
Klio2033 [76]

Using a linear search to find a value that is stored in the last element of an array of 20,000 elements, 20,000 element(s) must be compared.

6 0
2 years ago
Why is it hard for some people to keep a promise even one that they make to themselves​
tresset_1 [31]

Answer:

Awww what happened? Sometimes its hard for me to keep a promise.

Explanation:

7 0
3 years ago
Read 2 more answers
The following SQL statement contains which type of subquery? SELECT title FROM books WHERE EXISTS (SELECT isbn FROM orderitems W
Rudiy27

Answer:

(a) Correlated.

Explanation:

Correlated subquery :These sub queries reference columns from outer table or uses values from outer query.These sub queries are processed atleast once for every row processed.So because of this reason correlated sub queries can be slow.Since the query in the question also uses value from the outer query so it is a correlated query.

4 0
3 years ago
You are a networking consultant who has been asked to penetration test the network of a small business. you located a target wir
cluponka [151]
<span> In a network that uses WPA2-PSK encryption you can bypass the encryption by using the weakness in the WPA2-PSK system and that is the following:the encrypted password is shared in what is known as the 4-way handshake. </span> When a client authenticates to the access point, the client and the AP go through a 4-step process of authentication.
8 0
4 years ago
Google is an example of a(n):
bixtya [17]
It would B, because anytime you search it always pulls up google search engine.
8 0
3 years ago
Read 2 more answers
Other questions:
  • White arrows in the middle of the lane indicate whether the lane must __________.
    8·2 answers
  • Which of the following is a narrative essay most like?
    10·2 answers
  • What was the ENIAC computer and how was it used/what for?
    9·1 answer
  • ***Help ***Which Paste Command is used to insert a new linked Excel worksheet into a PowerPoint presentation? A. Embed B. Use De
    7·1 answer
  • A package that includes hardware, software, and support from a single vendor is called a(n ____ package.
    6·1 answer
  • QUESTION
    10·1 answer
  • Suppose you are given a bag containing n unbiased coins. You are told that n − 1 of these coins are normal, with heads on one si
    7·1 answer
  • In Modern operating system, the __ feature has dramatically improved user productivity.
    11·1 answer
  • For current events, what type of sources would we use to learn about them?
    14·1 answer
  • Message queues allow for programs to synchronize their operations as well as transfer data. How much data can be sent in a singl
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!