1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natita [175]
3 years ago
7

What can you hold in your left hand but not in your right? for creese7911 and maranda66

Computers and Technology
2 answers:
Drupady [299]3 years ago
8 0

Answer:

You're right hand or Left too

Explanation:

Because some people can hold some stuff on there hands

Amiraneli [1.4K]3 years ago
5 0
Your left hand can hold your right elbow, but your right hand cannot.
You might be interested in
Which of the following is the most appropriate unit to describe the rate at which data is transferred using the internet?
Andrei [34K]
The best option and the one who explains itself better is the first option <span>Megabits per second; because the independent quantity is time in seconds and dependent quantity is amount of data in megabits. In this case the dependent variable is the amount of data in megabits, something you can control, but time in seconds is indeed the independent variable.</span>
7 0
4 years ago
Read 2 more answers
How would someone know if their were communication devices placed in their homes illegally. Cameras and USB controlling devices?
Licemer1 [7]

<u>Explanation:</u>

Among the recommended options often suggested by IT experts includes:

  • In the case of cameras, using a cell phone around the home switch results in unusual signal interference possibly indicates a special radio frequency coming from the illegally implanted device.
  • The use of a mobile app designed for detecting hidden cameras. For example, the ”detect hidden cameras” app available on iPhone or Android mobile devices is a good tool. This app automatically senses  the radio frequencies of any hardware within the device range.
3 0
3 years ago
Which of these is an effective color scheme?
irga5000 [103]

Answer:

Yellow on white.

Explanation:

Not to bright, soft, and easy to see.

4 0
3 years ago
20<br>Calculate the kinette energy of a body the speed<br>that will be a mass tragm​
jolli1 [7]

Answer:

20

Explanation:

4 0
3 years ago
Installing unauthorized hardware such as a communication software and modem Select one: a. Is a common practice and does not aff
Alisiya [41]

Answer:

b. May introduce the potential for a security breach using a backdoor programmed into software

Explanation:

muchos malware dedicados al robo de datos son encriptados dentro de codigos que simulan aplicaciones de mensajería, diseñadas para parecerse a programas originales, muchas personas, sin el entrenamiento necesario, no notarían la diferencia, y por desconocimiento instalarían software peligroso.

las empresas, para cuidar el estado de la red, las computadores y los datos que manejan, adquieren softwares de fuentes confiables y verificadas por lo que hacer uso unicamente de estas aplicaciones autorizadas es la manera de mantener segura la red informática de la empresa.

7 0
4 years ago
Other questions:
  • A user complains that he cannot access a particular website, although he is able to access other websites. at which layer of the
    5·1 answer
  • A program called the ______ combines the object program with other programs in the library and is used in the program to create
    5·1 answer
  • hard disk drive has 16 platters, 8192 cylinders, and 256 4KB sectors per track. The storage capacity of this disk drive is at mo
    13·1 answer
  • Assume a 16-word direct mapped cache with b=1 word is given. Also assume that a program running on a computer with this cache me
    6·1 answer
  • which is the quickest way to change the font color in multiple, randomly located cells in a worksheet?
    6·2 answers
  • Two-dimensional random walk (20 points). A two-dimensional random walk simulates the behavior of a particle moving in a grid of
    14·1 answer
  • How are some businesses capitalizing on social media at the time of someones death
    7·1 answer
  • What line of code makes the character pointer studentPointer point to the character variable userStudent?char userStudent = 'S';
    5·1 answer
  • What are the similarities characteristics between computer and human beings?​
    13·2 answers
  • All Office programs have similar commands on the tab for changing the document view a. File b. View c. Locate d. display ​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!