1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dybincka [34]
3 years ago
7

How to shutdow computer

Computers and Technology
1 answer:
Paul [167]3 years ago
8 0

Answer:

well if your on windows you click the start button then click the power button then click shutdown if your on mac you click apple menu then shutdown if on a chromebook just hold the power button for 3 to 5 seconds

Explanation:

You might be interested in
Forms open in _______, which provides a user-friendly interface for entering data.
sergey [27]
They open in pdf format

5 0
3 years ago
What is most important for you to choose before you build a network?
lbvjy [14]

i'm needing help with the same question but mine gave choices, could you help please? thanks

A.  

private network

B.  

NOS

C.  

network media

D.  

network protocol

E.  

directory service

3 0
3 years ago
The production team for a fictional drama is shooting a key scene. One of the actors leaves out part of his scripted dialogue th
denis-greek [22]

Answer:

at last sentence was . The editor's work .

8 0
3 years ago
Read 2 more answers
"The Future of Money" notes that the value of cryptocurrency "changes often and depends on demand." How could reading "The Value
maw [93]

Answer:

<em>I think it would  b </em>

Explanation:

3 0
2 years ago
Orphan record example?
Goryan [66]

Answer:

If we delete record number 15 in a primary table, but there's still a related table with the value of 15, we end up with an orphaned record. Here, the related table contains a foreign key value that doesn't exist in the primary key field of the primary table. This has resulted in an “orphaned record”.

4 0
3 years ago
Other questions:
  • What technique creates different hashes for the same password? ccna routing protocols final answers?
    7·1 answer
  • Write a program that converst the temperature from Celcius to Fahrenheit. The formula is: F (9/5)C+32
    12·2 answers
  • What is meant by polling mode in communication between software andUART and what is its disadvantage as compared to interrupt mo
    14·1 answer
  • A(n) ________ operator, such as the greater than or less than symbol, can be used in a query criterion to limits the results pro
    12·2 answers
  • The M:N relationship between STUDENT and CLASS must be divided into two 1:M relationships through the use of the ENROLL entity;
    10·2 answers
  • An IP address in the form 197.169.100.1 is called a(n) ________. dotted quad encryption key random number sequential access numb
    7·1 answer
  • An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
    14·1 answer
  • Select the examples of common Arts, A/V Technology, and Communication employers. Check all that apply.
    10·2 answers
  • Please help I will mark brainliest
    5·1 answer
  • The following method in Inventory is intended to count how many batteries are fully charged. What should replace /*Missing Code
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!