1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
crimeas [40]
3 years ago
12

I get brainlist to whoever can help my computer is doing this and I have class and it’s not working and I got it wet yesterday b

ut it was fine in homeroom help please

Computers and Technology
2 answers:
UkoKoshka [18]3 years ago
7 0
Did u try rice? how about turning it off and back on again?
liq [111]3 years ago
3 0

Answer:

try putting a lot of rice on the screen.

Explanation:

if it got water in it that should help it.

You might be interested in
Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distr
hichkok12 [17]

Answer:C)Information management

Explanation: Information management is the technique through which the organization and handling of the the data/ information takes place.This technique is made for helping the organization and their business for the supporting the function and processes.

The facilities provided by the information management system is  development, management, designing, innovation etc.

Other options are incorrect because they are used for the coding process,technology and governing of the data, hence no management activity is done by them.Thus, the correct option is option(C).

4 0
4 years ago
Secure Hashing Algorithm (SHA) is an algorithm for generating cryptographically secure one-way hash, published by the National I
vitfil [10]

Answer:

64 bits.

Explanation:

Secure Hash Algorithms (SHA) :- These are a family of cryptographic hash functions. There are basically four types of secure hash algorithms for generating cryptographically secure one-way hash.They are as following:-

SHA-0

SHA-1

SHA-2

SHA-3

SHA -2 consists of SHA-512 and the word size used by it is 64 bits.

3 0
3 years ago
A GPS is an example of a dedicated device true or false
Galina-37 [17]

Answer:

true

Explanation:

4 0
3 years ago
in the client server model, what is the primary protocol used for communication between a browser and Web server
worty [1.4K]
Assuming the client is using a web browser, your answer would most likely be the Hyper-Text Transfer Protocol (HTTP).

HTTP is a very, very common way of transfering insensitive data from client to server. HTTPS is more secure, adding a secure socket layer to protect communications from being intercepted.

--

As an alternative answer, the FTP (File Transfer Protocol) may be an acceptable answer, but this is usually not the primary method of communication for clients, as it is mainly used to access and modify files on the server, requiring a username-password combo to do so (usually).


7 0
3 years ago
Did batman die in endgame? I dont have enough money to see the movie can you tell me what happens. It said batman died from some
kotykmax [81]

Answer: The Marvel batman, otherwise known as Iron Man did.

Explanation: Movie was pretty good.

5 0
3 years ago
Other questions:
  • If you have an application that is not responding and you want to force it to shut down, whichsystem utility can you use?
    8·1 answer
  • Write a C program that reads a string containing text and nonnegative numbers from the user and prints out the numbers contained
    6·1 answer
  • Which two statements give good definitions of financial credit
    8·1 answer
  • 3. By default, Blender® remembers your last 32 actions and allows you to undo them one at a time by pressing CTRL+Z. (1 point)
    9·1 answer
  • Why do hard drives tend to slow down over time?
    11·2 answers
  • Jamie is preparing a presentation on his laptop for his college annual event. He inserts audio and video files into the presenta
    11·2 answers
  • What line of code makes the character pointer studentPointer point to the character variable userStudent?char userStudent = 'S';
    5·1 answer
  • Identify a possible IOT (internet of Things) device in a smart kitchen and write a use case for interacting with the software of
    12·1 answer
  • Did you know you can buy a Passport Online?
    12·2 answers
  • What is software??????​??????????????????
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!