1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melamori03 [73]
4 years ago
15

10 POINTS FOR EACH PERSON WHO ANSWERS

Computers and Technology
1 answer:
Bingel [31]4 years ago
5 0

Answer:

.

Explanation:

You might be interested in
Which of the following describes how modern operating systems function?: A
sertanlavr [38]

Answer:

Try B

Explanation:

6 0
3 years ago
Which of these is a good guideline when using text on a slide?
aleksklad [387]
Use no more than two font types
3 0
4 years ago
Unlike the climate of the other islands of Hawaii, ________Kona contains 54 different temperate zones.
kramer

Answer:

<u>None</u>

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

Unfortunately, none of these answers would be factually nor grammatically correct. For Starters Kona is not an island Kailua-kona is the capital town of the Big Island in Hawaii.

Regardless of that fact, none of the answers given would make the sentence make sense grammatically. The Only way for the sentence to make sense grammatically, the answer either needs to stay blank or be Kailua. Like so...

Unlike the climate of the other islands of Hawaii, <u>Kailua</u> Kona contains 54 different temperate zones.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
_________ is the amount of data a storage device can move per second from the storage medium to ram.
mote1985 [20]
<span>data transfer rate..</span>
5 0
4 years ago
Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing at
Zepler [3.9K]

Answer:

Phishing Victim

Explanation:

Replying to this email could make you a victim of a phishing scam. Phishing attacks are common challenges on security that internet users are faced with. It could lead to others getting hold of sensitive information like your password or bank details. email is one way the hackers used to get this information. replying to such an email could lead one to an unsecure website where information could be extracted

4 0
3 years ago
Other questions:
  • What is a potential benefit of using a VPN? Select one: a. You could increase your level of privacy by guarding your real IP add
    9·1 answer
  • Why did some people not like the arrival of machines?
    13·1 answer
  • What are the features of the Outline view in Word? Select three options.
    14·2 answers
  • Jenny has to include the image of a sun on one of her slides. She needs to write relevant text about it on a dark background on
    6·1 answer
  • What are the benefits of Photoshop for graphic editors?
    8·1 answer
  • Technology has proliferated in Kenya and Somaliland, with text messages used to replace cash, creating mobile money use that, on
    11·1 answer
  • Concerning Structured Cabling, select the statement that is true, or select, "All statements are false."
    5·1 answer
  • Which tool is used to plan a web site?<br> HTML<br> Storyboard<br> Text editor<br> WYSIWYG
    5·2 answers
  • What breakthrough in sound recording facilitated stereophonic recording? Ο Α. overdubbing O B. multitrack recording O C. digital
    10·1 answer
  • HELP GEKP HELP HELP HELP HELP Cassandra is shooting a photo series in very low light. What kind of lens opening will
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!