1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blababa [14]
3 years ago
11

Justify the first two paragraphs and the tips list.

Computers and Technology
1 answer:
Ket [755]3 years ago
4 0

Answer:

dont mind me just hwere is your question i literaly can see it anywhere

Explanation:

You might be interested in
What is a table in excel
tekilochka [14]
A table in excel is responsible for keeping track of numerical data.

Meaning information in the form of numbers.
8 0
3 years ago
Read 2 more answers
Is there a way to search your computer for all music files on it?
Slav-nsk [51]
Yes their is a way go to your downloads see if you have some thing or their shall be something that you can type in your computer and find something or you can go to Youtube or google and they can show you a video or some articles.
5 0
3 years ago
Put your snap in the comments below if you want to be friends
jok3333 [9.3K]

Answer:

I don't have S nap, but my ensta is  brandnewmillennium

Explanation:

4 0
3 years ago
Read 2 more answers
Which process refers to starting up a computer?
alekssr [168]
The process of Starting up a computer is referred to as booting
5 0
3 years ago
Read 2 more answers
Which of the following Wi-Fi chalking method refers to drawing symbols in public places to advertise open Wi-Fi networks?
dezoksy [38]

Answer War Chalking

Explanation: War chalking is the technique for presenting the WiFi network publicly. This signifies about the WiFi is present but not describes the manner of it , that is whether it is open connection or closed connection.

It can be used by the people in general as well as hackers . Hackers usually tend to attack and hack its security that is present.Hackers then use the WiFi network  is then used for their own work after being hacked.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Can you subnet the 172.16.128.0/17 network address to support this subnet?
    6·1 answer
  • You are required to design a 4-bit even up-counter using D flip flop by converting combinational circuit to sequential circuit.
    15·1 answer
  • A _____ defines what must take place, not how it will be accomplished.​
    12·1 answer
  • What is the biggest challenge for most business when going online?
    12·1 answer
  • Dr. Kim divides a programming class into groups. Each group will create a large program as their
    15·2 answers
  • What is a task that is not associated with loading existing data into a new ERP system.
    11·2 answers
  • Write an<br>algorithm and draw flow chart to<br>find greatest among 2 numbers​
    13·1 answer
  • Define a query that uses the Natural Join command to join three tables to produce useful information.
    14·1 answer
  • Write at least and explain four types of escape sequences and create an example in an IDE which consist of the mentioned escape
    7·1 answer
  • Is a device used to test the network connection.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!