1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANTONII [103]
3 years ago
13

Help it don’t let me click what do I do

Computers and Technology
1 answer:
iogann1982 [59]3 years ago
3 0

Answer: Try resetting you device, or add a mouse to it.

Explanation:

You might be interested in
Tower of Hanoi algorithm 4 disks
Sophie [7]
????is this a question
4 0
3 years ago
Read 2 more answers
There is overlap in the subjects of study in the different information technology disciplines.
Korolek [52]

There is overlap in the subjects of study in the different information technology disciplines is a True statement.​

<h3>What is computer Science about?</h3>

There is found to be a lot of confusion about computer science and why it is said to be also called “computing”.

There is seen to be a lot of  allied computing-related fields, such as information systems and that of computer engineering.

Hence, There is overlap in the subjects of study in the different information technology disciplines is a True statement. because those subject have different topics.

Learn more about information technology from

brainly.com/question/25110079

#SPJ1

6 0
2 years ago
Read 2 more answers
In what year was the 1st zelda game released
cluponka [151]
Bro it was realesd in 1997
5 0
3 years ago
Read 2 more answers
What is the full form of HTML​
Naya [18.7K]

Answer:

hypertext markup language

3 0
3 years ago
Which is a basic job requirement for a career in corrections services?
Diano4ka-milaya [45]

You must have a high school diploma

7 0
3 years ago
Other questions:
  • James was having coffee and overhead a conversation between two men who talked about the fact that their friend could not find a
    10·1 answer
  • Physical access, security bypass, and eavesdropping are examples of how access controls can be ________.
    15·1 answer
  • What is the result of segmenting a network with a bridge (switch)? (Choose two)
    14·1 answer
  • A user receives a phone call from a person claiming to be from technical support. This person knows the users name and that the
    12·1 answer
  • ________ is the standard communications protocol used on most client/server networks.
    9·1 answer
  • Public-key encryption schemes are secure only if the authenticity of the ___________ is assured.
    12·1 answer
  • Which of the following operation is not performed by a mouse 1) left click , middle click , right click, double click​
    15·2 answers
  • How to make classs constructer java.
    14·1 answer
  • Bits of information are combined into meaningful units so that more information can be held in short-term memory through the pro
    5·1 answer
  • ASAP PLEASE the online research you did to describe how Senet is related to the culture and historical period when it was create
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!