1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mars1129 [50]
3 years ago
11

Select the images that are isometric drawings

Computers and Technology
1 answer:
valkas [14]3 years ago
7 0

Answer:

There’s no images

Explanation:

You might be interested in
You are a computer Tech. You have been asked to solve a computer problem. The office manager says his computer not working corre
Nat2105 [25]

Answer:

1. Reboot computer .

2. If the issue persists, check if antivirus software is updated; if so, then verify if the problem is only with Office suite, try to save another Word, Excel, Power Point document and running other programs. If the problem is also extended to Excel or Power Point and other programs run properly then:

a. Uninstall Office Suite (documents and information won´t be lost)

b. Reinstall Office Suite  

c.      Run Word, Excel, etc.

Word documents should open properly.

Explanation:

The above procedure should solve the problem given that it was verified and discarded that the malfunction was caused by a virus and upon verifying that the problem was not only with Word, but all applications related to Office Suite, then by reinstalling the software any malfunction could be fixed.

7 0
3 years ago
Read 2 more answers
A team composed of people with varied skills who attempt to penetrate a network is called which of the following?
Amanda [17]

Answer:

d. red team

Explanation:

A team has been composed of people that has different skills set and level of solving problem. The purpose of this team is to enhance the network security with the help of penetrating test skill. In penetrating test, different users from the team tries to enter the network to hack some user computer. Whenever some one successful to break the security then they will design another security protocol to enhance and improve the security of network in this particular case.

5 0
3 years ago
The most popular activities carried out on smartphones is _________. A.Texting B.Watching movies C.E-mailing D.Gaming
Soloha48 [4]

Yes the ansewer is c bc you can look it up!


4 0
3 years ago
Read 2 more answers
What are placeholders in Java?
Goryan [66]
C variables are placeholders in Java
5 0
3 years ago
Fill in the blank. THANK YOUU
Svetllana [295]

Answer:

She's procrastinating

Explanation:

3 0
3 years ago
Other questions:
  • Encryption that uses 16-character keys is known as ____. strong 128-bit encryption strong 256-bit encryption military-strength 5
    9·1 answer
  • Answer the following questions which are based on the study "Patients' Engagement with Sweet Talk." Submit your answers to the e
    9·1 answer
  • Which of the following statements is not correct ​
    6·2 answers
  • How to make a Tip Calculator in code?
    12·1 answer
  • Can someone tell me? I have an assignment in C++: I have to do three codes please tell me should i do them in one project or in
    12·1 answer
  • Hello Answerers it would be great if you could answer this:
    12·2 answers
  • What steps will add content to a report header section?
    5·2 answers
  • Which of the following is NOT a possible combination of values of the variables in this program when it finishes running?
    6·2 answers
  • What is this on g00gel Document, and how do I fix it?
    10·2 answers
  • Happy Valentine's day!!
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!