1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nostrana [21]
3 years ago
5

I love the brainly update guys! :)

Computers and Technology
2 answers:
MAXImum [283]3 years ago
8 0

Answer:

yea same

Explanation:

earnstyle [38]3 years ago
3 0

Answer:

you mind if i take these points?

Explanation:

You might be interested in
If you often purchase items at the same e-tailer and do not have to type in your username and/or password, this probably means
tatyana61 [14]

Answer:

Explanation:

This probably means that your browser has saved your username and password into the browser's password manager. This usually occurs the first time you enter your username and password into a new website. The browser will detect this and request to save this information into the password manager. If you agree to do so it will save it and automatically enter this information when opening the site in the future.

3 0
3 years ago
Describe how a black and white image could be represented in binary
SIZIF [17.4K]

Answer:

Each pixel in an image is made up of binary numbers. If we say that 1 is black (or on) and 0 is white (or off), then a simple black and white picture can be created using binary. To create the picture, a grid can be set out and the squares coloured (1 – black and 0 – white).

5 0
3 years ago
Read 2 more answers
Maia is typing her report on meerkats for her biology class.
dem82 [27]

Answer:

         

Explanation:

4 0
2 years ago
When performing forensics on an Apple computer, what operating system are you the most likely to encounter QUIZLET
lidiya [134]

When performing forensics on an Apple computer, the operating system are you the most likely to encounter is iOS.

<h3>What is operating system forensics?</h3>

A Operating System Forensics is known to be a method used for the retrieving of any useful information from the Operating System (OS) of the computer or any kind of mobile device.

Note that the reasons for collecting this information is so as to get all the empirical evidence against any kind of perpetrator.

Learn more about operating system from

brainly.com/question/1763761

3 0
2 years ago
Where does the book icon of the Help file take you?
8_murik_8 [283]

Where does the book icon of the Help file take you?

ans To a section to browse Help by category.

is answer hope you like it

"c"is correct

5 0
2 years ago
Other questions:
  • When it comes to safety, the choice to be safe is often up to __________?
    8·1 answer
  • What does TIA stand for?
    7·2 answers
  • PLEASE HELP
    15·2 answers
  • The idea generating technique most often used in writing business letter is ?
    9·2 answers
  • Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organ
    14·1 answer
  • Write a program using Python that prompts for an integer and prints the integer, but if something other than an integer is input
    11·2 answers
  • Which is NOT a benefit of using visual aids?
    9·2 answers
  • You have created a new dhcp scope with address range 192.168.1.1 to 192.168.1.254. you have five servers configured with static
    9·1 answer
  • How does a passive attack differ from an active attack?
    8·1 answer
  • What bonnie is this? From five night at freddys
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!