1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ankoles [38]
3 years ago
11

When I try to make an account, it always says that they are not able to complete the registration at this time. And I didn't alr

eady make an account so I don't know what to do....SOMEONE PLEASE HELP ME!!! THANKS!!
Computers and Technology
1 answer:
Anastasy [175]3 years ago
7 0
Maybe just wait a day and try again
You might be interested in
Someone knows a good compiler for iPad? It has to be an app
aksik [14]
Jedona is a good one
5 0
3 years ago
Which of the selections below does not represent a workable ip address?
defon

Answer: C

Explanation:

Because ipv4 ip addresses will be 4 sets of numbers for a maximum of 255 per set ie.  The highest ipv4 number is 255.255.255.255 and the answer C has 293 in it.

6 0
4 years ago
Learning how to use word processing and spreadsheets, and creating presentations are all considered __________ computer skills.
irina [24]

Answer: a i hope it help

Explanation:

4 0
3 years ago
Read 2 more answers
Which of the following activities are performed by computer programmers? Choose all that apply.
AleksAgata [21]

Answer:

- They write step by step instructions for a computer to follow.

- They create a logic problem that the computer program can solve.

3 0
3 years ago
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
mihalych1998 [28]

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
5 0
3 years ago
Other questions:
  • Lana is trying to insert a table, but she does not like any standard table options that she is given. Which best describes what
    5·2 answers
  • When looking at an object or process to code, it is important to think of as general a solution as possible and consider all the
    13·1 answer
  • Word processing software allows users to do which of the following: format text design pages share documents mail merge document
    14·2 answers
  • What does NVRAM stand for
    8·2 answers
  • Which of the following best describes the protocols used on the Internet?
    9·1 answer
  • Which tab allows you to modify the width of a page margins in Microsoft word?
    7·2 answers
  • The term “gigahertz” refers to how many cycles per second? One thousand One hundred One billion One million
    7·1 answer
  • Which practice is the best option for desktop security? A. Make a unique user ID and password for each account. B. Change the pa
    9·2 answers
  • What does it mean when a computer can't break the rules
    10·2 answers
  • .... is a way to engage people at different locations in synchronous interaction ( fill in the blank space)​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!