1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alina1380 [7]
3 years ago
8

I have a problem with my Nintendo DS lite does anyone know how to fix it?

Computers and Technology
1 answer:
Sonbull [250]3 years ago
6 0

Try checking if the battery is still working, they usually tend to give out at times.

You might be interested in
Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
liberstina [14]

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

3 0
2 years ago
Power brakes:
IgorLugansk [536]
The answer is B becausePower brakes are a system of hydraulics used to slow down or stop most motor vehicles. It uses a combination of mechanical components to multiply the force applied to the brake pedal by the driver into enough force to actuate thebrakes and stop a vehicle that can weigh several tons.
5 0
3 years ago
Read 2 more answers
What is output if the user types in 8
Lady_Fox [76]

Answer: 8

And if you hold shift while typing it, it gives *

7 0
3 years ago
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
finlep [7]

The answer is already given at the end of the question; solely by the magnitude or severity of expected harm

When assessing risks of harm associated with participation in a research study, the probability of harm and the risk of the severity of harm are two distinctive elements of risk that must be considered. In probability of harm, the fact that not all possible harms are equally probable should be considered. How these two elements occur is a crucial factor in determining the level of risk of harm in a study. Given the sensitivity of the information in the case scenario above, the probability that an individual subject could be identified is low while the magnitude of the possible risk of harm is high.


5 0
3 years ago
Read 2 more answers
The do-while loop is a __________ loop that is ideal in situations where you always want
belka [17]
your answers are all D
4 0
3 years ago
Other questions:
  • To extend the bottom border of a hyperlink across the complete width of a navigation list, change the ____ property of each hype
    9·1 answer
  • What do you call the combination of title, description, tags, and thumbnail?
    6·1 answer
  • To arrange data in alphabetical order quickly, you can _____ the data.
    7·2 answers
  • Who is responsible for customer service?
    14·1 answer
  • A network administrator recently implemented two caching proxy servers on the network. how can the administrator best aggregate
    5·1 answer
  • Most operating systems today primarily use a ____.
    12·1 answer
  • Why is it NOT a good practice to save everything on the desktop?
    6·2 answers
  • What would be an ideal scenario for using edge computing solutions?
    10·1 answer
  • You are critiquing a logo design that one of your coworkers proposed. Your sense is that the individual elements of the design a
    10·1 answer
  • Who is your favorite person from squid game?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!