1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
2 years ago
12

Can someone please help me I need to turn this in my 3:00pm Eastern time

Computers and Technology
1 answer:
galben [10]2 years ago
8 0

Answer:

1000000000

Explanation:

You might be interested in
What are other ways you could use the shake or compass code blocks in physical computing projects?
sashaice [31]

Answer:

Explanation:

there are different ways of quick navigation between files and functions. ... You should use the menu 'Remove file from project' instead of deleting files. ... A Makefile generation tool for Code::Blocks IDE by Mirai Computing

3 0
3 years ago
Read 2 more answers
_____ is a secret or illegal cooperation or conspiracy, especially in order to cheat or deceive others.A.CollusionB.Business eth
finlep [7]

The answer would be A.Collusion.

3 0
3 years ago
Game Informer (often abbreviated to GI) is an American-based monthly magazine featuring articles, news, strategy, and reviews of
Eddi Din [679]

Answer:

it is d i just took it

Explanation:

6 0
3 years ago
Read 2 more answers
What are the most important benefits of using Virtual Reality in business training?.
Effectus [21]

Answer:

If something goes wrong, it doesn't affect any real-world situations or the company itself in the real world

Explanation:

8 0
3 years ago
Read 2 more answers
Which sentence in the passage conveys the message that drones can be used in the study of history?
DENIUS [597]
Well the drone could go over the city then with that footage make a 3D model of what it probably looked like
5 0
3 years ago
Read 2 more answers
Other questions:
  • What mode is generally used when delivering a presentation to an audience?
    8·2 answers
  • 2. The part of the computer that provides access to the Internet is the A. monitor. B. keyboard. C. system unit. D. modem.
    11·2 answers
  • Weak Induction
    8·1 answer
  • What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to acc
    7·1 answer
  • The construction of a mixed media assemblage would be considered
    9·1 answer
  • A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department
    9·1 answer
  • Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?
    5·1 answer
  • People of brainly Just a quick warning that there is a group of people posting links with virus.
    11·2 answers
  • Which computers accuracy is much higher(i.e.analog & digital )​
    14·1 answer
  • The _____ _____ form of database attack injects code into user login information with one or more statements that perform action
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!