1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lord [1]
3 years ago
5

Free poi nts here you go

Computers and Technology
1 answer:
tatuchka [14]3 years ago
4 0

Explanation:

<em>Thank</em><em> </em><em>you</em><em> </em>

<em>Bye</em><em> </em><em>and</em><em> </em><em>have</em><em> </em><em>a</em><em> </em><em>great</em><em> </em><em>day</em><em> </em>

You might be interested in
The max-age attribute of a cookie is specified in
defon

Answer:

seconds.

Explanation:

max-age attribute of a cookie is specified in seconds.It sets the time when the cookie will be deleted.max-age attribute is not supported by all the browser.Internet Explorer does not support max-age.Son expires is used more than max-age because it supports almost all the browsers.

6 0
3 years ago
Identify which of these types of sampling is​ used: random,​ systematic, convenience,​ stratified, or cluster. To determine her
Zarrin [17]

Answer:

B.

Explanation:

Based on the sampling methods provided in regards to the question it can be said that the method being used is called Simple Random. This refers to dividing the population into different group which are then chosen at random, giving each group an equal chance of getting chosen. Which is exactly what is going on in this scenario, as the day is divided into three parts and her mood is measured randomly during each part of the day.

6 0
4 years ago
What is the output for the following program? numB = 2 while numB &lt; 15: numB = numB + 5 print(numB) Output:
slamgirl [31]

Explanation:

7

12

17

that's the answer

4 0
3 years ago
___ software creates a personal security zone around your computer by monitoring all incoming and outgoing traffic and blocking
serious [3.7K]
It is known as the firewall software. A firewall is a program or gadget that goes about as a boundary to keep ruinous components out of a system or particular PC. Firewalls are arranged with particular criteria to square or forestall unapproved access to a system.
4 0
3 years ago
A laser printer use laser to .
kondaur [170]

Answer:

print

Explanation:

the answer is print

5 0
3 years ago
Other questions:
  • Compare the two types of formatting that IDE devices must go through. What is the primary difference between the two?
    8·2 answers
  • Which of the following allows you to view and access important information about your document all in one location?
    11·2 answers
  • Earthquakes happen in the Earth’s
    10·1 answer
  • Why is it a mistake to put e-mail address of people who don't know each other in the "to:" field
    9·2 answers
  • . In many instances an IP address is used to access a server rather than a URL because a URL is more difficult to set up and eas
    10·1 answer
  • The small company where you work needs to implement a second server for its accounting system, but does not have the funds to pu
    11·1 answer
  • What file system allows you to continue to add files to a CD or DVD disc after the initial burn, as long as there is room on the
    14·1 answer
  • in a typical e-mail address, the "host" is A. an account designated by a user name B. CPU processor 2500 C. the receiver of an e
    12·2 answers
  • Pretend This artwork is titled online hate speech. Now what do you see?
    5·2 answers
  • Type of cable installed on a patch panel?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!