1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Degger [83]
3 years ago
8

Inc AX,2 is valid in assembly language ?

Computers and Technology
1 answer:
masya89 [10]3 years ago
4 0

Answer:

in most so yes

Explanation:

You might be interested in
What do we call the distribution and access of illegal copies of digital books??
Maru [420]
That concept is piracy


3 0
3 years ago
Read 2 more answers
Zachary was frustrated. His computer was running very slowly and he was worried that it was reducing his productivity on the job
Irina18 [472]

Literally QuickTime....I hate brainly

4 0
3 years ago
Jenny needs to record the names of 30 students, write down the subjects they studied, and note their grades in each subject afte
Marina86 [1]
The correct answer for this question is this one: "She can rename the 2 worksheet by right clicking the sheet tab. After right clicking the mouse, select Rename Sheet and type the preferred name of the sheet."  Hope this helps answer your question and have a nice day ahead.
5 0
3 years ago
Read 2 more answers
The undo button allows you to reverse up to ____ previous actions, one at a time.
Maurinko [17]
The undo button allows you to reverse up to 100 previous actions, one at a time.<span> The undo button is found in the toolbar. It erases the last change done to the document reverting it to an older state.</span><span> The change can be formatting text, moving blocks, typing and deleting text.

</span>
6 0
3 years ago
which statement describe “Hackers”? | A. all have the same motive | B. break into other people’s computers | C. may legally brea
AysviL [449]

Answer:

A

Explanation:

There's levels to it. As someone who use to play watchdogs anything is considered hacking.

5 0
2 years ago
Other questions:
  • A. true
    6·1 answer
  • This information is generally included on a fax cover sheet.
    15·1 answer
  • Suppose I have two DFAs D1, D2 and I perform the product construction on them to get a DFA for the union of their languages. Wha
    15·1 answer
  • Any kind of brances in science
    13·1 answer
  • What would happen if computers only had input devices?
    9·1 answer
  • Describe how a cell’s content and format attributes are related.
    13·2 answers
  • Dynamic addressing: __________.
    12·2 answers
  • What will be the range of the random numbers generated by the following code snippet? rand() % 50 + 5;
    14·1 answer
  • . Why is it important to use Social Media responsibly? ANSWER NOW!!!
    15·2 answers
  • consider the following code segment, which appears in a method in a class other than password. the code segment does not compile
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!