1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
3 years ago
5

Please help it’s timed

Computers and Technology
1 answer:
Lyrx [107]3 years ago
8 0

Answer:

you are proooooooooooooooooooo

Explanation:

You might be interested in
How many bits would be used to count the students in class today?There are 10 students
Vikentia [17]

Answer:

4 bits

Explanation:

With 4 bits you can count to 15, because 2⁴=16. The maximum number you can express is always one less, i.e., 16-1=15.

In general, with n bits you can count to 2ⁿ-1.

7 0
3 years ago
Read 2 more answers
If you are in a tornado situation which of the following should you NOT do?
Hunter-Best [27]
Three. A bridge can be put under immense pressure during a storm. In addition to that if a tornado has caused a storm surge the rising water could make you drown
5 0
3 years ago
Which process best describes how you might prepare to apply for a job?
saveliy_v [14]
Take an online course,or maybe do special trainings,practice and study.
8 0
3 years ago
Read 2 more answers
WILL GIVE BRAINLIEST + 50 points!!
Ghella [55]

Answer:

i put a

Explanation:

3 0
2 years ago
A picture icon that is a direct link to a file program or folder
Tems11 [23]
It's a folder button or desktop button mostly I recomend the folder button

4 0
3 years ago
Other questions:
  • A loop within another loop is known as a(n) ____ loop.
    10·1 answer
  • And art for always texting graphics are pasted is known as
    12·2 answers
  • The gaining of unauthorized access to data in a<br> system or computer:
    11·1 answer
  • 2. Write a simple program in C++ to investigate the safety of its enumeration types. Include at least 10 different operations on
    5·1 answer
  • Which of the following attack is a threat to confidentiality?
    10·1 answer
  • What is the definition of digital literacy?
    7·2 answers
  • What is media ethics. Explain two forms of maintaining media ethics with examples​
    13·1 answer
  • What tool is used to find and organize files on a mac
    6·1 answer
  • Big Data _______________. Relies on the use of unstructured data imposes a structure on data when it is captured relies on the u
    15·1 answer
  • Select the correct answer.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!