1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavel [41]
2 years ago
12

Which laptop part is usually replaceable through unlocking it, pulling it out, and then replacing it with a new one?

Computers and Technology
2 answers:
leva [86]2 years ago
7 0

Answer:

maccbook

Explanation:

maccbooks r awesome

Blababa [14]2 years ago
3 0

Answer: Hard drive

Explanation:

You might be interested in
+
quester [9]

Answer:

Network administrator

5 0
3 years ago
Read 2 more answers
Which extension is appropriate for Word document templates?
expeople1 [14]
The answer to this question is A
8 0
2 years ago
Read 2 more answers
For each of the following SQL queries, for each relation involved,list the attributes that must be examined to compute the answe
Vlada [557]

Answer:

1. E.eid ,E.hobby, E.sal, E.did

2.E.eid , E.sal, E.hobby ,E.did , D.did, D.floor ,D.dname , D.budget.

3.E.eid , E.sal, E.hobby ,E.did , D.did, D.floor ,D.dname , D.budget.

4.E.eid , D.dname

Explanation:

The attributes that are examined for the query are the attributes of the table that are mentioned in the select statement and where clause.

So according to first query we are working on all attribues of Emp table so all of the attributes of Emp table are examined.In second query we selecting all attributes of both the tables hence all attributes of both the table and same in the next query.

In fourth query though the query is not complete where clause is missing but we have eid from Emp and dname from Dept tables for sure and the attributes mentioned in where clause will also be present.

7 0
3 years ago
Distinguish among packet filtering firewalls, stateful inspection firewalls, and proxy firewalls. A thorough answer will require
4vir4ik [10]

Answer:

packet filtering

Explanation:

We can use a packet filtering firewall, for something like this, reasons because when visiting a site these types of firewalls should block all incoming traffic and analyze each packet, before sending it to the user. So if the packet is coming from a malicious origin, we can then drop that packet and be on our day ;D

7 0
3 years ago
Could anyone beat my typing?<br><br> https://keyma.sh/custom/33K7C
insens350 [35]

Answer:

This should not be typed in brainly. Brainly is for answering questions

Explanation:

8 0
3 years ago
Other questions:
  • Select the best answer for the question. 2. What is the simplest way to permanently get rid of an unwanted file?
    13·1 answer
  • Before donating a computer you should use a program to wipe the hard disk to remove all of its data
    12·2 answers
  • I need help!
    14·1 answer
  • To rearrange the data on your hard disk so your computer can run more efficiently, you use ____.
    13·1 answer
  • How do you respond to an email?
    6·1 answer
  • Make me die from laughter i will give brainlyest for the best joke
    11·1 answer
  • In the RSA system, the receiver does as follows:1. Randomly select two large prime numbers p and q, which always must bekept sec
    6·1 answer
  • Which of the following is a database concept that allows for storage and analysis for a dozen to billions of data points?
    7·1 answer
  • What is your favorite song? mine is "In the final"
    7·2 answers
  • Does the source MAC address match your PC interface?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!