1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mylen [45]
3 years ago
10

Do these devices allow you to view photos using the cloud?

Computers and Technology
1 answer:
ivann1987 [24]3 years ago
8 0

Answer:

Yes, You can view the cloud on those devices

You might be interested in
What type of html list will automatically place a list marker, or bullet point, indicator in front of each item? group of answer
scZoUnD [109]

Main Answer:What type of html list will automatically place a list marker, or bullet point, indicator in front of each item? group of answer choices description l <u>unordered list</u>

Sub heading:

How many types of html list and explain?

Explanation:

1.There are three types

unordered list

ordered list

description list

2.unordered list: is used to group a set of related items in no particular order.

Reference link:

https://brainly.com

Hashtag:

#SPJ4

3 0
2 years ago
The expectations I would discuss with Erica regarding the usage of the internet
ryzh [129]

Answer:

Tell her about cyber bullies

Tell her about hackers

stalkers

identity theft

spam

Sorry if wrong

Explanation:

8 0
3 years ago
HELPPPP MEEEE!!!!! ITS LIFE OR MUERTEEE
garri49 [273]

The author uses the text structure of compare and contrast to show multiple signals.

<h3>What is Text structures?</h3>

This is a term that connote the method used by authors to put together information in text.

Note that in the case above, The author uses the text structure of compare and contrast to show multiple signals.

Learn more about text structure from

brainly.com/question/12053427

#SPJ1

8 0
2 years ago
________ is a password-cracking method wherein the attacker compares passwords to lists of common words.
Dmitriy789 [7]
Hi!

When someone repeatedly compares passwords to lists of common words, this is known as the dictionary attack.

We call it this because they are <em>literally </em>using a dictionary to attack you!

Hopefully, this helps! =)
7 0
3 years ago
Read the excerpt from Act 111, scene iii of Romeo and Juliet. Which is the best paraphrase of this dialogue
Rufina [12.5K]
I think that D is the answer
8 0
3 years ago
Other questions:
  • ____ languages create source code using words and structures similar to spoken language.​
    15·1 answer
  • What was one complication caused by the tsunami that struck japan in 2011?
    15·1 answer
  • Develop a Python program. Define a class in Python and use it to create an object and display its components. Define a Student c
    11·1 answer
  • The concept of "space" on a computer usually refers to the___.​
    7·1 answer
  • A trust domain is defined as Select one: a. The agreed upon, trusted third party b. A scenario where one user needs to validate
    5·2 answers
  • What is net pay?<br> What is net pay?
    11·2 answers
  • Explain the emerging trends in microcomputer technology in relation to size​
    11·1 answer
  • Question #5
    15·2 answers
  • One can find mountain ranges, elevation levels, and deserts on a physical map.
    15·2 answers
  • Computer always produces wrong output true or false<br>​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!