1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prohojiy [21]
3 years ago
11

AYYOOOO CAN YOU HELP A GIRL OUUTT???

Computers and Technology
1 answer:
goblinko [34]3 years ago
8 0

Answer: The answer is true

You might be interested in
Any action that causes harm to your computer is called a
oksano4ka [1.4K]

Answer:

Security risk.

Explanation:

It is making your computer vulnerable to attacks and less secure.

3 0
3 years ago
What does RoHS stand for and why is RoHS compliance important?
gladu [14]

Answer:

It stands for Restriction of Certain Hazardous Substances.

Web search says it is important because,

RoHS compliance dovetails into WEEE by reducing the amount of hazardous chemicals used in electronic manufacture. Put another way, RoHS regulates the hazardous substances used in electrical and electronic equipment, while WEEE regulates the disposal of this same equipment.

Explanation:

8 0
3 years ago
Which logic gate produces an output of 1 only if both it’s inputs are 0?
ElenaW [278]

Answer:

the nand gate  

5 0
3 years ago
Read 2 more answers
Which best describes the Big Bang Theory?
Aleks04 [339]
A. We still have evidence the universe is expanding as well
8 0
3 years ago
Read 2 more answers
Vector images take up much less space when saved to a computer or storage device because computers and storage devices just need
AleksandrR [38]

Answer:

False

Explanation:

4 0
2 years ago
Read 2 more answers
Other questions:
  • Using the CPI to calculate the inflation rate​ _______________ the underlying inflation​ rate, and using the core inflation rate
    7·2 answers
  • What specific information would you need to obtain from an ISP or cloud service provider whose hosting services you wanted to us
    9·1 answer
  • Using a subject directory, you locate a particular topic by clicking links through different levels. a. True b. False
    10·1 answer
  • FOR 15 POINTS AND BRAINLIEST!<br> What are the possible consequences of Invasion of privacy?
    8·1 answer
  • You are a police officer trying to crack a case. You want to check whether an important file is in the evidence room. Files have
    5·2 answers
  • In a TCP session hijacking attack, if the server is waiting for data starting from sequence number X, but we used X 100 in our a
    13·2 answers
  • Information about a computer file, not the actual data that is contained in the file, is called ______
    8·2 answers
  • What is netiquettes?. Mention any 4 netiquettes. (for class 6)​
    5·1 answer
  • Which is the correct expansion of the term Internet?
    14·2 answers
  • What is the difference between packaged and tailored software ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!