1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AVprozaik [17]
2 years ago
13

Please choose odd one out please tell fast ​

Computers and Technology
2 answers:
nikklg [1K]2 years ago
8 0

Answer:

cpu

Explanation:

wariber [46]2 years ago
4 0

Answer:

CPU bc A-Z is the first to the last also with the one digit numbers 0-9 so there for there is  no connection with CPU as the other ones.

Explanation:

Hoped I helped have an amazing day. Please consider marking this brainliest thank you in advanced if you do!

You might be interested in
Which of the following uses replication to Infect multiple computers?
Nikolay [14]

Answer:

Trojan horse

Explanation:

mostly all the above mentioned use replication to infect computers but the one that uses replication to invest multiple computers at a time is Trojan horse.

hope it helps .

3 0
2 years ago
Read 2 more answers
The area or the window that shows the current folder location​
Alex Ar [27]

Answer:

The focused window

Explanation:

However, please provide some more details about this because the question itself is very vague.

8 0
3 years ago
A narrative is a:
drek231 [11]
It is B.series of links to other stories.
7 0
2 years ago
Read 2 more answers
True of False - use T or F An interface is compiled into a separate bytecode file (.class).
olga55 [171]

Answer:

T

Explanation:

An interface is compiled to a separate bytecode class file.

For example of out application has a class myClass.java and an interface myInterface.java:

class myClass{

   String name;

   int age;

}

interface myInterface{

  public String getName();

  public int getAge();

}

Both of these are compiled to their own respective class files by the compiler,namely, myClass.class and myInterface.class.

5 0
3 years ago
What are Important advice to include about spyware, viruses, and other types of malware?
Contact [7]
They can corrupt data giving away confidential information, which in some cases is a violation of customer privacy and should be taken very seriously. Also it can slow the machine down exponentially. Some malware can delete files required for the machine to run and ultimately render it useless.
3 0
2 years ago
Other questions:
  • Two electronics technicians are looking at the testing instrument in the figure above. Technician A says that this instrument is
    7·1 answer
  • Which of the following statements about professional codes of conduct is true?
    12·1 answer
  • What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
    7·1 answer
  • What is an IP address and where I can find the IP address for my computer?
    14·1 answer
  • What should be done with statements or sections which are unclear?
    12·2 answers
  • The lower band and upper band of integer data type​
    6·1 answer
  • You've just installed a new video card in a user's Windows workstation. When the system is powered on the screen is blank. You
    10·1 answer
  • write a program that asks the user for a month number and displays the number of days that month has?
    7·2 answers
  • True or false: you should reuse passwords on multiple websites because it will help you remember those passwords
    12·2 answers
  • what uses gps tracking to track vehicles? group of answer choices edge matching. cartography. automatic vehicle location. geogra
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!