1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julsineya [31]
2 years ago
5

Choose all that apply.

Computers and Technology
2 answers:
kirill115 [55]2 years ago
6 0

Answer:

Bullets can be turned off and on.

Lists don't have to use numbers or bullets.

Explanation:

because L just wanted the light

MrRa [10]2 years ago
3 0

Answer:

B and C

Explanation:

Hope it helps!

You might be interested in
Identify a statement that accurately differentiates between short-term memory and working memory.
Veronika [31]

Answer:

Short term memory is in which a person may forgot very previously introduced knowledge, whereas working memory...well...works. Most people have working memory.

Explanation:

5 0
3 years ago
Fill in the table below of the Interactive Word Wall. You are provided with the
kakasveta [241]

Answer:

that is so long i just want points

Explanation:

7 0
2 years ago
B. List any four major drawbacks of the first generation computer​
d1i1m1o1n [39]

Answer:

Terribly low storage space, limited to mathematics/computing, required entire rooms to use, and low information yield for hours of processing.

Explanation:

3 0
2 years ago
A network technician cannot get a host to connect to the internet. running the ping command shows the apipa ip address. what is
Lunna [17]
The router will not connect to th network. This will keep it from connecting to the NEXUS
6 0
3 years ago
Which type of storage disk and disk drive can you use in the given situation?
Margarita [4]

Answer:

The answer to this question is DVD and DVD-RW

Explanation:

6 0
3 years ago
Other questions:
  • What is binary in computer science ​
    11·1 answer
  • What is the communications activity of the Internet called
    15·1 answer
  • Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
    11·1 answer
  • A tower or mini tower pc is a type of all- in -one unit true or false
    9·2 answers
  • What component of Kerberos is responsible for storing keys for encrypting and decrypting data in the authentication process?
    13·1 answer
  • You need to install an operating system on a computer that will be sharing files for the company employees. You estimate there w
    9·1 answer
  • A writing team wants to present the six-month sales figures for its company's 14 sales representatives in a report. Because mana
    11·1 answer
  • Which of the following is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct
    15·1 answer
  • What is the suffix of hollow?
    7·1 answer
  • How has 5G become more energy efficient?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!