1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena55 [62]
3 years ago
7

Is there any way to delete old questions on this? if there is no way, take this as a free question​

Computers and Technology
2 answers:
Lostsunrise [7]3 years ago
8 0

Answer:

moderators have to delete it for u

Explanation:

IrinaK [193]3 years ago
6 0

Answer:

moderators can delete your question

You might be interested in
Which service uses a broadband connection?
Sidana [21]

Answer:

d

Explanation:

because all in one question form

5 0
3 years ago
You receive an email from someone who claims to be a representative from your credit card company. the email asks you to clink o
larisa86 [58]
You should call the company that your credit card is in and ask if you were sent an email. tell the time it was sent. the date. everything.
8 0
3 years ago
What is the best Describe an integer data type
kolbaska11 [484]

Answer:

It is a data type that only holds whole numbers, a.k.a. integers.

what is the picture about?

3 0
3 years ago
Which of the following is the fastest processor
Nookie1986 [14]
Usually a Xeon is the fastest. Matters what time it was built and the chipset. If its old, the i7 is faster.
6 0
3 years ago
During email encryption, the system creates which type of key to allow the user to send an encrypted email?
kiruha [24]
A hope this is correct just read an article on it
5 0
3 years ago
Read 2 more answers
Other questions:
  • Describe a situation where it would be advantageous to use the copper tape or aluminum foil instead of the A and B push buttons
    7·2 answers
  • _ is a model of computing in which computer processing, storage, software, and other services are provided as a shared pool of v
    10·1 answer
  • In order to prevent unauthorized access, how can the shadow file be configured to enforce a password policy?​ What happens to ac
    6·1 answer
  • Create a button to play the playlist <br><br> Java, netbeans
    7·2 answers
  • Information management should supply information in the form of meaningful images rather than raw data, which requires that we h
    13·1 answer
  • What is the critical path?
    15·1 answer
  • Choose all stages of the information processing cycle.
    12·2 answers
  • Explain the working system of computer systems with examples​
    14·1 answer
  • High-level languages must be translated into machine language before they can be executed. _________________________
    10·1 answer
  • What is the best method to avoid getting spyware on a machine
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!