1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
2 years ago
9

My mom hid my laptop and now I can't find it​

Computers and Technology
1 answer:
Svetach [21]2 years ago
3 0

Answer: did you look everywhere ask for it and be like mom i wont do (whatever you did) ever again so please give me a chance can i plsss!!!!!! have it back?

Explanation:

simple as that step by step

You might be interested in
How do you work with collaborators like copywriters developers and project managers?
romanna [79]

Answer:

Have a place for the who team can access all the information they need and use to put their work for project managers to check-up on. Having a when everything is organized in one place, the work will be much smoother.

3 0
3 years ago
When a private network uses a single public ip address, and each outgoing tcp packet uses a different port to allow for proper t
m_a_m_a [10]
The networking technology in use is NAT.
8 0
3 years ago
Donna is a graphic designer working on a poster for a music concert. What is her objective?
Marina86 [1]

Answer:her objetive is to impress the public with the poster.

Explanation:

The poster have to be about the music. It is very important for the singer or the festival.

The objetive is going on with the festival, with the music and with the concert’s style.

It’s a personal design. But it have to be original for every design.

3 0
2 years ago
Read 2 more answers
Ron was asked to maintain a database to record the height of every student in class.
Fiesta28 [93]

B. =Compare(B3;B4)

hope I helped!!!

4 0
3 years ago
Read 2 more answers
PLEASE HELP! 25 POINTS!
irina [24]

Answer:

Its hard to answer unless im in the situation but id find a way to stop the car and figure out a way to get out and then call police

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is a collection of honeypots used to present an attacker aneven more realistic attack environment?a. Padd
    6·1 answer
  • Assume that the variables gpa, deansList and studentName, have been declared and initialized . Write a statement that both adds
    6·1 answer
  • Are there protections for people in terms of what data can be collected by different sites?
    10·1 answer
  • Fair use allows individuals to break copyright so long as they ________.
    15·1 answer
  • A Chief Information Security Officer (CISO) needs to establish a KRI for a particular system. The system holds archives of contr
    13·1 answer
  • Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
    14·1 answer
  • What are the network topologies? Advantages and disadvantages.
    9·1 answer
  • Pls help I will give points
    7·1 answer
  • HELP I SUCK IN THIS HELP!!!!! ​
    13·1 answer
  • Help me asap ill give brainliest
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!