1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
S_A_V [24]
3 years ago
15

Alexa it is olewi.............................................

Computers and Technology
2 answers:
Vadim26 [7]3 years ago
7 0
Huh.........whattttt
Sladkaya [172]3 years ago
6 0

Answer:

jvksvksdvkbvkjsdkcn

Explanation:

You might be interested in
A(n) ____ network uses a central cable to which all network devices connect.
NNADVOKAT [17]
<span>A bus network uses a central cable to which all network devices connect</span>
4 0
3 years ago
Additional rows and columns are inserted into a table using the
Paladinen [302]
The Option D , Table Tools Insert
6 0
3 years ago
What does a proxy server do?
Otrada [13]

I believe your answer would be C, but that also falls under a VPN.


8 0
3 years ago
Read 2 more answers
What is best android apps​
natima [27]

Answer:

brainly

Explanation:

cuz yeah its the best app ever tbh

8 0
3 years ago
Read 2 more answers
Please list 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.
nikklg [1K]

Answer:BE RESPECTFUL! Always treat the computer lab equipment AND your teacher and classmates the way that you would want your belongings and yourself to be treated.

No food or drinks near the computers. NO EXCEPTIONS.

Enter the computer lab quietly and work quietly. There are other groups and individuals who may be using the computer lab. Please be respectful.

Surf safely! Only visit assigned websites. Some web links can contain viruses or malware. Others may contain inapropriate content. If you are not certain that a website is SAFE, please ask a teacher or other adult.

Clean up your work area before you leave. All cords should be placed on the tables (not hanging off the sides). Headphones should be placed on the CPU/tower or monitor. Chair should be pushed under the tables. All trash, papers, and pencils should be picked up.

Do not change computer settings or backgrounds.

Ask permission before you print.

SAVE all unfinished work to a cloud drive or jump drive. Any work that is saved to the computer will be deleted when the computer is powered off or updated at the end of the day.

If you are the last class of the day, please POWER DOWN all computers and monitors.

Keep your files organized

Don’t let a student’s desktop become the digital version of his hectic book bag. Set aside a few minutes at the beginning or end of working on an assignment to ensure that students are saving unfinished work somewhere that they will be able to find it next time.

Log off

Logging off is like the digital version of cleaning up after yourself in the classroom. Students need to leave the computer ready for the next user. Logging off is also important to make sure that student work and accounts stay private.

Each person may only use one computer at a time

Computers and peripherals are not to be moved or reconfigured without approval of Lab and Classrooms staff.

Behavior and activities that disturb other users or disrupt the operations of the lab are not allowed. This includes, but is not limited to: physical activities such as "rough-housing," loud music, etc.

Children are only allowed in computer labs if they are well-behaved and supervised at all times. Children may not use the computers or occupy workstation areas. At no time are children to be left unattended.

.Explanation:

sorry about only 9 rules

4 0
3 years ago
Other questions:
  • Is a growing network of physical objects that have sensors connected to the internet?
    15·1 answer
  • Information gathered from observing a plant grow 3 cm over a two-week period results in _______.a. inferences. b. variables. c.
    11·1 answer
  • Which software application can best help teachers determine their students' average grades?
    5·2 answers
  • 13) Search engines and metasearch engines are examples of which network application?
    12·1 answer
  • You csn access various sites on the www by using hyperlinks or by
    7·1 answer
  • Name a device, app or website then give features of the app that make it addictive and humane. (3 details for each)
    5·1 answer
  • Which best explains a password attached to a document?
    7·1 answer
  • Anyone knows how to do this??
    13·1 answer
  • Select four tasks associated with operating system maintenance. Cleaning inside the computer Defragmenting the hard drive Deleti
    11·1 answer
  • An algorithm is a step by step process that describes how to solve a problem and/or complete a task, which will always give the
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!