1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GREYUIT [131]
3 years ago
15

Does anyone know what to do when brainly won't let you answer questions? I click on answer question and then it just sits there

not even loading.
Computers and Technology
2 answers:
sveticcg [70]3 years ago
8 0

Answer:

That'll happen to me every once in a while. What you have to do is reload the page. If it still doesn't let you answer, try exiting out the page, and getting back on it with a new tab.

Hope this helps!!

iren2701 [21]3 years ago
8 0

Answer:

<em>It could be either a </em><em>wifi issue,</em>

<em> brainly </em><em>having problems</em>

<em> or your account is </em><em>banned for 24 hours </em>

Explanation

<em>Hope this helps, if it doesnt, i am sorry and i suggest</em><em> reaching out to brainly :)</em>

<em>stay safe :))</em>

<em>brainliest is appreciated :)</em>

You might be interested in
Sam wants to move across the text and his documents to add data at predefined stops. Which key will Hughes to navigate through t
Setler [38]

Answer:

The TAB key

Explanation:

Sam would use the TAB key, located on the left side of the keyboard, to move around his document to add stops and format its information properly.

Pressing the TAB key will introduce a tab code in his document, which is like moving ahead by a certain number of spaces (5,6, 10 spaces for example, depending on the configuration of the document), but without using spaces, using a tab which is a much better option to position, align things up.

5 0
3 years ago
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are calle
yuradex [85]

Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.

4 0
2 years ago
If i find an image and copy and paste it into Paint.
Leokris [45]

Answer:

Lossy image formats will remove data during compression as a trade off for lower storage occupation. Lossless data formats will not remove data during compression, resulting in higher quality but also higher storage occupation.

Graphic Artists will almost always use lossless due to it delivering the highest quality image possible.

8 0
3 years ago
Which property do you use to align an element horizontally with the left or right edge of its parent element?
Ugo [173]
A thank me later:) give me hearts
3 0
2 years ago
What can multivariable calculus show for a data set.
dalvyx [7]

Answer:

They can help to explain the relationship between the output and input variables.

Hope this Helps!

5 0
2 years ago
Other questions:
  • Which statement describes the word "iterative"?
    7·2 answers
  • Pretrial services programs are also known as early intervention programs. <br> a. True <br> b. False
    15·1 answer
  • Which commas is used to combine two or more cells together into one cell
    11·1 answer
  • Help me please (program c++)
    11·1 answer
  • If you are involved in a collision that results in property damage, injury, or death, you must call
    13·1 answer
  • Simplify the Boolean expression AB+(AC)`+AB`C(AB+C)
    13·1 answer
  • Select the correct answer from each drop-down menu. A company is recruiting for a web designer. What kind of candidate should th
    14·2 answers
  • Which TWO of these correctly describe a Trojan horse malware?
    11·2 answers
  • Find out about the different technological solutions available for interconnecting LANs to from larger networks such as wide are
    5·1 answer
  • windows switches to secure desktop mode when the uac prompt appears. what is the objective of secure desktop mode?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!