1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GREYUIT [131]
3 years ago
15

Does anyone know what to do when brainly won't let you answer questions? I click on answer question and then it just sits there

not even loading.
Computers and Technology
2 answers:
sveticcg [70]3 years ago
8 0

Answer:

That'll happen to me every once in a while. What you have to do is reload the page. If it still doesn't let you answer, try exiting out the page, and getting back on it with a new tab.

Hope this helps!!

iren2701 [21]3 years ago
8 0

Answer:

<em>It could be either a </em><em>wifi issue,</em>

<em> brainly </em><em>having problems</em>

<em> or your account is </em><em>banned for 24 hours </em>

Explanation

<em>Hope this helps, if it doesnt, i am sorry and i suggest</em><em> reaching out to brainly :)</em>

<em>stay safe :))</em>

<em>brainliest is appreciated :)</em>

You might be interested in
Eliza needs to share contact information with another user, but she wants to include only certain information in the contact. Wh
Maslowich

Answer:

Use the edit business card dialog box to control the information.

Explanation:

Business card is an easiest way to share contact details with other persons. There are some reasons a person might not want to share entire details of the contact it has with the other person, for this purpose the business card outlook has an option to edit the information of contact before sending it to the other person. Click the contact card and select the relevant contact that needs to be shared, then double click the contact it will display an edit option.

6 0
3 years ago
Read 2 more answers
What's is the contribution of technology to the country?
slamgirl [31]
To help us get news from different countries
8 0
3 years ago
A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify a
yarga [219]

Answer:

Intrusion detection systems

Explanation:

Intrusion detection systems (IDS) are systems designed to monitor network use for any potential hacking or suspicious activity and then take measures to issue alerts upon discovery of such activity. IDS are applications that help secure a network or system from policy breaching or other activities that may be harmful to the network. There are four major types of IDS and they are: Perimeter Intrusion Detection System (PIDS) , Network intrusion detection system (NIDS), VM based Intrusion Detection System (VMIDS), and Host-based intrusion detection system (HIDS) .

7 0
3 years ago
There are about what licensed drivers here in Florida
arsen [322]
 There are about 15,000,006
6 0
3 years ago
Different between ocular and compound miscroscope
Nuetrik [128]
<span>One system of lens - ocular microscope
Two systems of lens - compound microscope

Some of the parts of a compound microscope are the </span>eyepiece lens.<span> There are two knobs on under the other to one side of the microscope which are used for </span>Coarse focus and Fine focus. There is an illuminator<span> at the bottom of the microscopic stand, which sheds a powerful light on the subject under the lens. Other parts include </span>objective lenses<span>, </span>stage with stage clips<span> (where the subject is placed) and r</span>evolving nosepiece. The tube<span> connects the eyepiece lens to the </span>turret<span>.</span>
3 0
3 years ago
Other questions:
  • You need to put cabling for connecting two new computers in a room, which did not have any network infrastructure. Because of th
    9·2 answers
  • Why are cable networks such as mtv and cnn more profitable than the big four broadcast networks?
    8·1 answer
  • Within the Chart Design tab, which section is used to change the data of a previously created chart?
    12·1 answer
  • Select the correct answer
    11·1 answer
  • Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha
    11·1 answer
  • What do u say to your bf if he says sayy lesssss
    14·2 answers
  • In Windows Vista, which button is used to create a new folder?
    7·1 answer
  • What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
    10·2 answers
  • True or false when a host gets an IP address from a DHCP server it is said to be configured manually
    15·1 answer
  • How to create a network of relevant prospects?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!