1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana [24]
3 years ago
10

PLEASE ANSWER FAST!!!! look at the image below

Computers and Technology
2 answers:
Lubov Fominskaja [6]3 years ago
7 0

Answer:

mbnlkgjhituyhklcjvjhklhur

Explanation:

hjiuyotgjfhkjmrti

Lady bird [3.3K]3 years ago
5 0
A should be the answer
You might be interested in
______ are used to store all the data in a database.
e-lub [12.9K]

Answer:

C. Fields

Explanation:

Fields are used to store all the data in a database.

6 0
3 years ago
Please help me I don’t know what to do
kiruha [24]

Answer:

B

Explanation:

4 0
4 years ago
Read 2 more answers
State four input device that are used for playing gaming programs​
bekas [8.4K]

Answer:

Mouse, Keyboard, Headphones, Charger.

Explanation:

These can be plugged into the computer for gaming and other uses.

5 0
2 years ago
Read 2 more answers
Two types of are desktop computers and notebook computer
aalyn [17]

Explanation:

A. personal computer

wait others answer for sure

4 0
3 years ago
Read 2 more answers
Where do today's computers store almost all motherboard configuration data?
sergij07 [2.7K]
In the mother board of the back door next to the restroom 5 steps left
3 0
3 years ago
Other questions:
  • Which of the following controls will provide an area in the form for the user to enter a name? a. button b. label c. text box d.
    8·1 answer
  • The way a program is proceed is know as control flow and are :Sequence(one line after the other), Decision-making(either this or
    8·1 answer
  • What is the full form of icimod?
    6·1 answer
  • In a car crash, wearing a seat belt __________________.
    5·2 answers
  • Why is the ketboard calledQWERTY
    11·2 answers
  • The foundation of secure communication on the internet replies on asymmetric encryption, with the use of Public and Private keys
    10·1 answer
  • Website managers use____ every day.
    10·2 answers
  • Which factor affects reading speed the most?
    9·1 answer
  • PLS HELP MEE it's due in 2 minutes​
    7·1 answer
  • The Linux tail command prints the last maximum n lines of a file. When writing a function that performs this function, choose th
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!