1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delicious77 [7]
3 years ago
15

Choose the correct item. Check your answers in the text.3​

Computers and Technology
1 answer:
RSB [31]3 years ago
5 0

Answer:

You should do that

Explanation:

You didnt say anything

You might be interested in
.In Python, comments begin with the comment marker and continue ______.
earnstyle [38]

Answer:

b. to the end of the line

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

Python is a unique language compared to other languages such as Java and C++. In Python comments are started with the comment marker which is the hashtag (#) symbol and continues <u>to the end of the current line</u>. Once the line ends the next line is <u>NOT</u> automatically considered a comment unless another hashtag is placed.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

4 0
2 years ago
Impact of information technology in the society​
GarryVolchara [31]

Answer:

led to exposure of dangerous things

3 0
2 years ago
What do people do when they navigate using GPS
Debora [2.8K]

Answer:

they use  it when they are driving and when they dont know where they are doing

Explanation:

7 0
3 years ago
Read 2 more answers
What are the top and side margins for a letter typed in standard format?
BabaBlast [244]
Should be 1’ on each side
4 0
3 years ago
Describe the function of the user account section of the control panel
cluponka [151]
From Google:

"User Account Control<span> or </span>UAC<span> for short is a security feature of Windows which helps prevent unauthorized changes to the operating system. These changes can be initiated by applications, users, viruses or other forms of malware."</span>
6 0
3 years ago
Other questions:
  • What two terms below describe a network device with three ports, two of which send and receive all traffic, and the third port m
    6·1 answer
  • What are 2 ways that technology can negatively impact the environment.
    8·2 answers
  • Create a simple main() that solves the subset sum problem for any vector of ints. Here is an example of the set-up and output. Y
    12·1 answer
  • How can improving one’s reasoning skills also improve one’s performance on the job?
    12·2 answers
  • What takes information entered into a given system and sends it automatically to all upstream systems and processes?
    6·2 answers
  • In most software packages, the function key F1 is used to run the _____program.
    10·1 answer
  • What is the hexadecimal equivalent of the decimal number 256?
    11·1 answer
  • Write a for loop to print all NUM_VALS elements of array hourlyTemp. Separate elements with a comma and space. Ex: If hourlyTemp
    11·1 answer
  • When Gina was 10, she swam in the ocean for the first time. She remembers the feeling of kicking her feet, slicing her arms thro
    12·1 answer
  • I'm bad i'm mrs puff doo doo doo yeah it's a holiday
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!