1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pentagon [3]
3 years ago
8

The cameras picture review function allows you to look at the _ you've taken

Computers and Technology
1 answer:
xxMikexx [17]3 years ago
6 0

Answer:

Explanation:

Pictures

You might be interested in
An array subscript can be an expression, but only as long as the expression evaluates to what type?
densk [106]

Integer Integer Integer Integer Integer Integer Integer Integer Integer Integer Integer Integer Integer Integer Integer

6 0
3 years ago
The set of rules for how computers talk to one another is called
lianna [129]
Protocol. Like TCP/IP or HTTP etc
6 0
3 years ago
HELP!!!
jeyben [28]

Answer:

A. a tool tip

Explanation:

6 0
3 years ago
Read 2 more answers
You need to configure your Android phone so that you can receive your Yahoo email on the device. What information would you need
Llana [10]

Answer:

To configure an Android phone to receive Yahoo email on the device, you would need to provide the:

full Yahoo email address and password.

Explanation:

The provision of your full Yahoo email address and password enables you to receive your Yahoo emails on the device.  Most often, the device requests to save the information to enable it to notify you of incoming emails.  There are settings for the provision of this notice.  The user can also synchronize Yahoo emails on all the devices by selecting the Sync button.

5 0
3 years ago
What is Tesla BEST know for designing this? ANSWER
Aleonysh [2.5K]

Answer:

  1. tesla coils
  2. tesla
  3. edison
  4. x ray
  5. slinky
  6. time travel
  7. he spent it
  8. blue tooth

Explanation:

3 0
3 years ago
Other questions:
  • Hacker is a person who illegally breaks into a system or network without any authorization to destroy, steal sensitive data or t
    14·1 answer
  • Which option is most likely used to create many-to-many relationships in Access?
    8·1 answer
  • In JavaScript, which of the statements below can be used for string declaration?
    11·1 answer
  • Develop a Java program that determines the gross pay for an employee. The company pays hourly rate for the first 40 hours worked
    8·1 answer
  • When RadioButton objects are contained in a group box, the user can select only one of the radio buttons on the panel.
    12·1 answer
  • The _______ contains the most commonly used commands.
    6·2 answers
  • Write a program that will find the smallest, largest, and average values in a collection of N numbers. Get the value of N before
    13·1 answer
  • Evie clicks through her presentation slides and realizes they all have transition effects coming from the same location, from th
    13·1 answer
  • ¿Es lo mismo hablar de tecnología que de computadora?
    12·1 answer
  • Can someone help me so I don’t fail this class:(
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!