1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tpy6a [65]
3 years ago
9

3. Windows that are viewed as Web pages have sections. **

Computers and Technology
2 answers:
tankabanditka [31]3 years ago
8 0

Answer:

when the when the when the add the when are you is id god his gay for your top off jack dafe cafe read line green red whats the answer

Explanation:

ValentinkaMS [17]3 years ago
5 0

Answer:

+1

Explanation:

You might be interested in
A user found that their personal data had been exfiltrated from their computer by a malicious program that they clicked on sever
Firlakuza [10]

Answer:

Assuming this can only have one answer, i believe adware is very far from the type of malware that did infect the system, Spyware.

Explanation:

8 0
3 years ago
What is the value of the variable phones after the execution of the following code? phones = {'John': '5555555', 'Julie' : '7777
uysha [10]

Answer:

phones = {'John': '1234567', 'Julie' : '7777777'}

Explanation:

In the code given in the question phones dictionary contains contains two keys John and Julie and have the values '5555555' and '7777777' respectively. Now in the code the key John in the dictionary phones is assigned the value '1234567' .So the value corresponding to the key John becomes '1234567'.

3 0
3 years ago
Because it allows their files to be accessed from any device on the Internet, many users like to back-up their files using ___ s
77julia77 [94]

Answer:

Cloud

Explanation:

Cloud computing is a central form of storing data on a data center, provided online, to provides inexpensive and secure storage facilities and central accessing of document, using any device and accessing the data from anywhere and time.

Data stored in a clients computer system, would have to be transferred to another remote computer by using a portable storage, to share data. Using a cloud service or a database center service, a document can be accessed by a group of users at the same time, in different places, and assures a secure data in the database.

3 0
3 years ago
1.<br> The correct way to use a seat belt is
Nesterboy [21]

Answer:

4 steps

Explanation:

Step 1: Pull belt across body

Sit in any of your vehicle's seats and secure the three-point harness in its buckle by pulling it across your body.

If the seatbelt is too short, consider an aftermarket restraint and extender. Make sure they meet federal safety standards and are installed professionally.

Step 2: Adjust lower belt

Adjust the lower belt snuggly across your lap and pelvis area – never your stomach.

Pregnant women should wear the lap belt below their belly, not on or above it.

Step 3: Adjust shoulder belt

Adjust the shoulder belt to fit comfortably across the collarbone and chest. It should never rub on your neck or face. Never put the shoulder belt behind your back or under your arm.

Step 4: Check before driving

Check that the belt is secure before driving.

4 0
3 years ago
The range A2:B4 has how many cells?   A. 2   B. 4   C. 6   D. 8
olya-2409 [2.1K]
The answer to that is D.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Which command would you use to move a file from one location to another?
    6·2 answers
  • According to the article in WikiAnswers, digital communication systems have more benefits than analog systems. They are faster a
    10·2 answers
  • Is backing up computer files done on the hard drive?
    5·1 answer
  • A computer is a multipurpose device that accepts input processes data and produces output all according to a series of stored
    8·1 answer
  • Chat messages are most likely to be found where on a computer? firewall nic internet history ram
    7·1 answer
  • what is it called when someone uses software to run multiple operating systems on one computer at the same time? A.functional vi
    9·1 answer
  • True or False. When used with the cout object, the endl stream manipulator advances the cursor to the next line on the computer
    6·1 answer
  • In bankruptcy, most of a debtor’s assets will probably be used to repay unsecured debt
    9·1 answer
  • Your supervisor has asked you if it is possible to monitor servers for potential port scans via SNMP. What two OIDs can you prov
    13·1 answer
  • What are the differences between a cursor, insertion point and mouse pointer?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!