1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
3 years ago
13

If a touch screen chrome is not charging what is wrong with it

Computers and Technology
2 answers:
Andrew [12]3 years ago
8 0

Answer:

A try buying a new charger if that dont work then try going to best buy to fix it after that ion rlly know

AysviL [449]3 years ago
5 0
Look it up on a best buy website ion know
You might be interested in
The most popular input device of a computer is a(n) ____.
zaharov [31]
A keyboard and a mouse

7 0
3 years ago
hich type of denial of service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly map
shusha [124]

Answer:

DNS poisoning

Explanation:

This type of attack is known as DNS poisoning it is a very common attack that focuses on trying to redirect users of the site that has been attacked towards fake servers. These fake servers belong to the attackers and are used to collect the user's private data, which can then be used by the attackers for a wide range of malicious acts. Aside from stealing user information, this malicious data travels alongside regular user data allowing it to infect various servers easily.

7 0
3 years ago
2. Answer any
lozanna [386]

Answer:

C

Explanation:

martin luther kings speech is being restated in todays current events in the BLM protests because martin luther king was basically fighting for black peoples rights and the 14th and 15th amendments were supposed to help black peoples rights and freedom but today people aret following that because of police violence/brutality

8 0
3 years ago
¿Cuales son los dos estados de una computadora y que significa cada uno?
hjlf

Answer:

En ciencias de la computación, el estado de un circuito lógico digital o programa de computadora es un término técnico para toda la información almacenada a la que un circuito o programa tiene acceso en un momento dado. La información recibida previamente en las entradas se almacena en la memoria de elementos electrónicos, como disparadores, celdas de memoria. El contenido almacenado de estos elementos de memoria, en un momento dado, denominado colectivamente el "estado" del circuito, contiene toda la información sobre el pasado al que tiene acceso el dispositivo. Así, básicamente, una computadora puede tener acceso a dicho estado o no, según se encuentre encendida o apagada.  

4 0
3 years ago
What should you consider when developing your website content?​
Law Incorporation [45]

Answer:

what your customers are looking for.

your latest promotions and discounts.

your brand values.

whether the content will go viral or not

3 0
3 years ago
Read 2 more answers
Other questions:
  • how do you make a circuit so 1 switch will turn on/off all the lights(3 lights) and a second switch will change the lights from
    14·2 answers
  • Select the correct answer.
    6·1 answer
  • <img src="https://tex.z-dn.net/?f=3x%20-%205%20%3D%203x%20-%207" id="TexFormula1" title="3x - 5 = 3x - 7" alt="3x - 5 = 3x - 7"
    12·1 answer
  • Mia is attending a team meeting to discuss how to prevent accidents. One of her teammates suggests pushing all the desks against
    15·2 answers
  • How can you achieve an effect like that shown in the image?
    7·2 answers
  • Antivirus software uses ________ to search for known viruses.
    9·1 answer
  • Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than
    14·2 answers
  • Fill in the blanks to complete a summary of this part of the passage. For the power of Patents
    6·2 answers
  • What is meant by byte in computer terminology​
    6·2 answers
  • Robert is risk manager at TPT Bank has been asked to implement an updated badge reader system for addressing access control risk
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!