1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka94
3 years ago
13

What are the missing letters _A_TO_ ( 6 letters) a type of computer.

Computers and Technology
2 answers:
Marina CMI [18]3 years ago
6 0
WELLL WELLL WELLL ITS A A Laptop
aliina [53]3 years ago
4 0

Explanation:

its a laptop ☺️. . . . . .. . .

You might be interested in
____ are commonly used for communication between OS components, for queuing requests to an OS service, and for exchanging messag
vekshin1

Answer:

C. Pipes

Explanation:

Pipes are medium of communication between two or more interrelated processes. It is used for communication between operating system components. It is also used in exchanging messages between components of large programs. It implements interprocess communications through an interface. It passes information from one program process to another.

3 0
3 years ago
Read 2 more answers
What console can be used to enable disable start or stop a service
umka21 [38]
That would be msconfig!
5 0
3 years ago
(EASY)
AnnyKZ [126]
If you go to a college website you will see the it has .edu in the URL extensions.
3 0
3 years ago
Read 2 more answers
The IT infrastructure components should be evaluated based on their expected financial value. All of the following are used to q
vladimir2022 [97]

Answer:(A) usability

Explanation:

The term usability refers to the usage value of products, how much they can be used and their value after their use. So adding on these points usability helps to quantify the financial value of IT components.

5 0
3 years ago
In computer science what are the methods used to protect the information stored by a piece of software called?
Nezavi [6.7K]

Answer:

cryptography

Explanation:

cryptography

In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher

3 0
3 years ago
Other questions:
  • ANSWER IN 5 MINUTES TO GET 50 POINTS!!!
    13·1 answer
  • Which of the following is a true statement about psychological tests administered by computers? computers make standardization e
    9·1 answer
  • In the game of economics, producers look to technological improvements to increase which of the following?
    7·2 answers
  • Information from the system that is used to make modifications in the input, processing actions, or outputs is referred to as: G
    9·2 answers
  • How to change screen resolution in windows 10?
    5·1 answer
  • What is the "online disinhibition effect"?​
    7·1 answer
  • QUESTION 9 of 10: Bob charged $200 for a plane ticket last month. When he received his statement, he saw that he could pay the m
    12·2 answers
  • How does a author develop a character in a story?
    14·2 answers
  • What is TCP/IP adress​
    10·1 answer
  • outline 4 IDE features that makes software development much faster and more convenient than other alternatives.​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!