1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melomori [17]
3 years ago
15

Hellpppp please I need it!

Computers and Technology
1 answer:
Anna [14]3 years ago
8 0

Answer:

1 you can transfer photos or files from one device to another

2 you can store photos or files so you save space on a device

3 not sure lol

Explanation:

You might be interested in
What is thought to have caused the extinction of the dinosaurs?
AnnyKZ [126]
I think it's believed that an asteroid that hit Earth caused their extinction.
3 0
4 years ago
What is one problem you should keep in mind when researching information on the Internet?
shepuryov [24]
The answer is A due to the internet being a plethora of information being accessed by anyone and everyone with internet access. Any person of no background to certain information could claim mastery to the field and sway his/her audience to ways possible. Ensuring that the source of the information being read is from credible and reputable companies. You can do this by ensuring the information is from newspapers with names known all over the world or there are also sourced footnotes from the author where they could have cited some information from other articles. 
5 0
3 years ago
Read 2 more answers
With a word processor, you can create all of the following EXCEPT __________.
Nata [24]
You cannot create a database wurg a word processor
8 0
3 years ago
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be
lions [1.4K]

Answer:

chosen ciphertext

Explanation:

Chosen ciphertext attack is a scenario in which the attacker has the ability to choose ciphertexts C i and to view their corresponding decryptions – plaintexts P i . It is essentially the same scenario as a chosen plaintext attack but applied to a decryption function, instead of the encryption function.

5 0
3 years ago
Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
Georgia [21]

rcre2nvijrnv

u1bcihdebc

nn

8 0
4 years ago
Other questions:
  • What aspect of web design is Gloria following when she uses the same color
    5·2 answers
  • In some cases, certain Hyper-V guest operating system features do not function properly using the operating system's own device
    9·1 answer
  • A technician suspects a network card is not working. Which tool should the technician use to test the network card?
    14·1 answer
  • A manufacturer of machine tools creates a spreadsheet of tools and their cost. The spreadsheet has four fields: name of the tool
    10·2 answers
  • Can someone buy me eddie van der tabs???
    13·1 answer
  • Complete the statement below using the correct term.
    14·1 answer
  • What is the reason for taking care of design a good computer human interface ​
    9·2 answers
  • Which tabs are expandable and collapsible
    14·1 answer
  • What’s unique about New Cashierless stores?
    14·1 answer
  • What's the difference between an exe file and an msi file? check all that apply.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!