1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luda [366]
3 years ago
10

Heres a memefree pints as well, because why not.​

Computers and Technology
2 answers:
storchak [24]3 years ago
5 0

Answer:

lolllllllllllllllllllllllllllllllll

EleoNora [17]3 years ago
4 0

Answer:

Yay thank you!

Explanation:

You might be interested in
A Windows systems administrator should use the Administrator account ________.a. As little as possible, and only when needed b.
torisob [31]

Answer:

a. As little as possible, and only when needed

Explanation:

6 0
3 years ago
What is the decimal number 86 when written as a
Flura [38]

Answer:

a

Explanation:

  • on your caculator
  • type in he number 86
  • then press the 2andF button
  • and the soution will show
4 0
2 years ago
In a stream channel what is deposited first?
asambeis [7]
Gravel sized particles
6 0
3 years ago
2. How do cell phone users stay connected to the network as users move between cells?
kramer

Answer: Cell phones use radio waves to communicate

Explanation:

Radio waves carry the information and travel in air at the speed of light. Cell phones transmit radio waves in all directions.

5 0
3 years ago
The status bar only lets you view the current X, Y and Z coordinates of the cursor. Select one: True False
Zinaida [17]

Answer:

True

Explanation:

The XY and Z represent

Minimize

Maximize and

Close

8 0
4 years ago
Read 2 more answers
Other questions:
  • What are the advantages of renting a home over buying a home? What are some disadvantages?
    13·1 answer
  • Identify the false statement.
    8·1 answer
  • When activated, an Excel object has all the features of an Excel
    8·2 answers
  • A user on a home network needs to boost the signal of the wireless router. What should the user purchase to accomplish this?
    14·1 answer
  • Which best describes obliteration in a forged document?
    11·1 answer
  • tls Explain in your own words how, by applying both asymmetric and symmetric encryption, your browser uses TLS to protect the pr
    8·1 answer
  • Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?
    5·1 answer
  • Why is it important to ensure that DNS Servers have been secured before implementing an e-mail system
    7·1 answer
  • 4.1 code practice python
    13·1 answer
  • True or False: Once you rename a field, the new field name must be used in the rest of the search string.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!