1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bas_tet [7]
2 years ago
14

What gaming PC should I get

Computers and Technology
2 answers:
zhuklara [117]2 years ago
8 0

Answer:

ps5

Explanation:

Kipish [7]2 years ago
3 0
Might as well buy a ps5 at this point
You might be interested in
When it comes to credit scores, why is having a
inessss [21]

Answer:

credit karma

Explanation:

karma is -69

6 0
3 years ago
Write a program that calculates the total amount of a meal purchased at a restaurant by a customer. The program should ask the u
Illusion [34]

Answer:

Python script is given below

Explanation:

charge = float(input('Enter the amount you were charged. $'))

#setting the formula for tip and tax

tip = charge*.18

tax = charge*.07

#printing the values

print('Charge for the food: %.2f' % charge)

print('The tip amount: %.2f' % tip)

print('Tax amount: %.2f' % tax)

print('Total amount: %.2f' % (charge+tip+tax))

7 0
3 years ago
The italic button is located on the
SashulF [63]
It is located on Mini Tool Bar 
6 0
3 years ago
Which of these is a valid use of the Reply All feature?
zalisa [80]

Answer:

I think is None of this ,

6 0
3 years ago
A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
Lynna [10]

Answer:

vulnerability, risk

Explanation:

A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.

6 0
3 years ago
Other questions:
  • A four year old laptop will not boot and presents error messages on the screen
    8·1 answer
  • An important communication principle states ""prepare before you communicate."" How should this preparation manifest itself in t
    10·1 answer
  • 22
    15·1 answer
  • Correct all the mistakes in the following sentence:
    15·2 answers
  • Match the elements used in web searches to their functions.
    12·1 answer
  • Write a program that lets the user perform arithmetic operations on fractions. Fractions are of the form a/b, in which a and b a
    11·1 answer
  • What are the disadvantages of vector images when compared to bitmap images?
    14·1 answer
  • In a selection, the else clause executes ______________. a. always b. when the tested condition is false c. when the tested cond
    6·1 answer
  • Which of the examples is part client side code
    10·1 answer
  • Most spyware programs are benign in that they do not perform malicious acts or steal data. group of answer choices true false
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!