1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melisa1 [442]
3 years ago
5

I need the answer ASAP. I’ll mark brainliest if right

Computers and Technology
1 answer:
Kisachek [45]3 years ago
7 0

Answer:

copy or repeat

Explanation:

You might be interested in
Why online fraud rose 79% in UK after they switched to the chip and PIN system in the first three years?
irakobra [83]

Answer:

TBH I HAVE NO FREAKING IDEA BUT I NEED POINTS BC IM DOING AN EXAM AND HAVE NO MONEY SORRY

5 0
2 years ago
Which organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for
SashulF [63]

The organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for html5 is the W3C.

<h3>What does the W3C do?</h3>

The W3C's is known to help to create protocols and rules that makes sure that long-term  development of the Web.

Therefore, we can say that The organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for html5 is the W3C.

Learn more about The W3C  from

brainly.com/question/11179793

#SPJ1

3 0
2 years ago
Imagine your making directions easier for someone to go from any is city to another us city. Choose any 2 cities, and then Using
AnnyKZ [126]

Answer:

\huge\bold\red{Yes}

6 0
2 years ago
Suppose you’re creating a slide presentation. During the presentation, you’ll need to go to a specific address on the Web. You s
Lesechka [4]

hyperlink

a hyperlink is what will let them click the link and go to it

please give branlest

3 0
3 years ago
Read 2 more answers
Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is
Molodets [167]

Answer:

False

Explanation:

7 0
3 years ago
Other questions:
  • Henry uploaded the photos of his birthday to a cloud storage system. He feels that it’s a safe option for data storage. His frie
    12·1 answer
  • IN MICROSOFT EXCEL YOU CAN UES FOMULA TO DIVIDE OR MULTIPLY WHAT IS THE CORRECT FORMULA TO CALCULATE 4*6
    14·1 answer
  • Encyclopedia.com is considered to be
    15·1 answer
  • What kind of information can be found in a ROM:
    14·1 answer
  • Many languages distinguish between uppercase and lowercase letters in user-defined names. What are the pros and cons of this des
    8·1 answer
  • What is the primary uses of cell phone
    12·2 answers
  • Koi friend online hai kya​
    15·1 answer
  • Imagine that you work for a company directly related to your major. Your company is preparing for expansion and your boss, Ms. S
    14·1 answer
  • The PowerPoint view in which you can edit the slide master is called ______________.
    7·1 answer
  • What options are available for storing backups, physically?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!