1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Varvara68 [4.7K]
3 years ago
6

Guys I really need help,

Computers and Technology
2 answers:
sukhopar [10]3 years ago
8 0

Answer:

you might have to get a new account or delete it and get it again

Explanation:

melamori03 [73]3 years ago
4 0

Answer:

You may have to make a new account. Im not actually sure if you can change your age. It might help if you ask on the websites help centre.

You might be interested in
List and describe two of the four generally recognized security positions.
Llana [10]
CISO: This person reports directly to the CIO and is responsible for assessing, managing, and implementing security.
Security Technician: Entry-level position and provides technical support to conFgure security hardware, implement security software, and diagnose and troubleshoot <span>problems</span>
8 0
4 years ago
Chegg A full bootstrap program Select one: a. may be infected by viruses. b. is stored in ROM to ensure to avoid any infection f
harina [27]

Answer:

Option b = "is stored in ROM to ensure to avoid any infection from viruses. "

Explanation:

In order to to understand the fundamentals of an Operating system in computer one needs to know what the bootstrap program is.

The BOOTSTRAP PROGRAM is first program that will run when the computer is switched on, thus the program( the BOOTSTRAP PROGRAM) will be the program to open the OPERATING SYSTEM.

The device in laptops and personal computers known as ROM is an acronym that stands for Read-Only Memory and it is a storage medium. Because of ROM inability to get Virus it is used in the storage of Bootstrap program.

8 0
3 years ago
Hey can you help we with this thanks
dimulka [17.4K]
Hey, it's easy, come on!
6 0
3 years ago
________an approach to database and software development that emphasizes "individuals and interactions over processes and tools,
dimulka [17.4K]

Answer:

Agile software development

Explanation:

Agile software development  model is a blend of iterative and steady procedure models with center around process flexibility and consumer loyalty by fast conveyance of working programming item. Nimble Methods break the item into little gradual forms. These assembles are given in emphases.

So in blank space there will be Agile software development

7 0
3 years ago
Name of the best Android keyboard
mrs_skeptik [129]

I think Gboard is good, you can switch between languages quickly and you can translate in real time. Translation is not perfect, but it is the best translation available. Vocabulary and autocorrect is not bad too. You can change the background. It has some themes of its own, but you can always customise it with your own photo. It has instant gif, stickers and emoji options too. It also has a good collection of symbolic emojis like: *\0/*O_o(๑♡⌓♡๑)ᕙ( • ‿ • )ᕗ(☉。☉)!I cannot include all of them, they are in 100s.

But if you are looking for a solution for grammatical mistakes, then you may want to consider Grammarly.

5 0
3 years ago
Other questions:
  • A financial consulting firm recently recovered from some damaging incidents that were associated with malware installed via root
    6·1 answer
  • Invention I chose was radio.
    9·1 answer
  • Why process scheduling is needed in a uni-processor system?
    12·1 answer
  • There are n coins, each showing either heads or tails. We would like all the coins to show the same face. What is the minimum nu
    6·1 answer
  • Should the federal government have bug bounty programs? Why or why not?
    9·2 answers
  • Using a combination of symmetric and asymmetric key encryption, Sofia sent a report to her home office in Indiana. She received
    12·1 answer
  • Computer father known as​
    5·1 answer
  • A python program for the following output using for loop.
    13·1 answer
  • Games set in modern times are less difficult to a tie to a specific culture than games set in past eras
    14·1 answer
  • Which statement best describes network security?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!