1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Damm [24]
3 years ago
13

Can someone tell me which key is the num lock

Computers and Technology
1 answer:
Klio2033 [76]3 years ago
6 0
I don’t understand what u mean can u explain so i can help
You might be interested in
What is an examlple of cyberbullying
Alex73 [517]

Answer:

sending rude text messages

Explanation:

3 0
4 years ago
Discuss briefly general-purpose graphicsprimitives that contain 2D graphics library.
Zina [86]

Answer:

  General purpose graphics primitives that contain 2D graphic library as, it is used in graphics processing unit which typically manage computation for computer graphics. Graphic primitives contain basic element such as lines and curves. Modern 2D computer graphic system that operate with primitives which has lines and shapes. All the elements of graphic are formed from primitives.

8 0
3 years ago
Hewo everyone look at me I look ugly don't I<br>​
Gwar [14]

Answer:

Na, you look stunning...!!!! UwU

4 0
3 years ago
Read 2 more answers
If Tamya makes $1000.00 gross monthly income and her total payroll deductions are $294.00, what is her net income?
Maru [420]

Answer:

$751

Explanation:

From the question we have the following information;

Gross income = $1000.00

Deductions =   $294.00

Now we know that;

Net income = Gross income - Deductions

Therefore;

Net income = $1000.00 -  $294.00

Net income = $751

7 0
3 years ago
Summarize who you believe cyber criminals are, and why?
sergij07 [2.7K]

Answer:

 The cyber criminals are the people that are engaged with getting the data in an unapproved way and furthermore mischief to the association henceforth are considered as cyber criminals.

Cyber criminals are people or groups of individuals who use innovation to committed the malicious exercises on computerized frameworks or systems with the aim of taking the organization data or individual information and producing benefit.

There are many types of cyber criminals that are:

  • Internet stalkers
  • Cyber terrorist
  • Identity thieves

5 0
4 years ago
Other questions:
  • What are some food project ideas?, its for my technology homework
    10·1 answer
  • The analog signals that carry analog or digital data comprise composites built from combinations of simple sine waves.
    12·1 answer
  • Question 2 (1 point)
    9·1 answer
  • What are the basic tools for coding HTML manually?
    10·2 answers
  • What keyword do we use when instantiating an object _________________
    15·1 answer
  • Your sister is considering purchasing a tablet computer that utilizes RT as the
    11·1 answer
  • ___ is an example of a function prototype.
    12·1 answer
  • When a person or organization uses the services of another professional, that person or organization is called the _______
    15·1 answer
  • 3s X 82 = X +y? is this true
    10·2 answers
  • Key Vocabulary:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!