1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iris [78.8K]
3 years ago
9

Open Meet and enter this code: jnw-xodp-yij only for boys​

Computers and Technology
2 answers:
Agata [3.3K]3 years ago
8 0
Skegeuabdvsjalalsjsn
Ivenika [448]3 years ago
8 0
I will try to join but on what app ?
You might be interested in
What is the largest place value in a 12 bit binary number?
azamat
The largest binary number that can be expressed with 12 bits is all 1s, which means 1 followed by 1 followed by 1, up to 12 times.
6 0
3 years ago
B. Identify the purpose of each of the following types of utility programs
olya-2409 [2.1K]

<u>These are the types </u>:

1. Antivirus software : Detects and removes virus and malwares from   computer system.

2.Disk defragmenter : Reduces the fragmented space in the disk.

3.Disk cleaner : Build to find and delete unwanted files to free the disk space.

6 0
4 years ago
Please Help!
tatyana61 [14]

Answer:

Its B,D,E

Explanation:

Got it right on e2020

5 0
3 years ago
Write the definition of a method printdottedline, which has no parameters and doesn't return anything. the method prints to stan
oksian1 [2.3K]
Void <span>printdottedline()
{
   printf(".....\n");
}

</span>void printdottedline()
{
   printf(".....\n");
}
8 0
3 years ago
Explain the difference between computer and computer systems.
9966 [12]

Answer: Computer commonly consists of HARDWARE and SOFTWARE. HARDWARE are the physical parts of the computer like keyboard, mouse, hard disk, processor, ram and Rom etc. SOFTWARE is the set of instructions that tells the computer what to do, For example Windows operating system, MS Word, MS Excel, Norton Anti virus all are software.

Explanation: plz add me as Brainiest

5 0
3 years ago
Other questions:
  • What is data called that is input into a cryptographic algorithm for the purpose of producing encrypted data?
    14·1 answer
  • Which of the following are pointers? Select all that are correct. hub node router transmission media switch port interconnector
    7·2 answers
  • How to Ctrl + shift + F4 but in a HP laptop?​
    8·2 answers
  • Refer to the image below. The letter item indicated at 3. is_____________________ a Your Address - Where you are b The Letter Ad
    7·1 answer
  • Key physical database design decisions typically do not include: A) choosing the storage format for each attribute from the logi
    12·1 answer
  • Verify (valid or not valid) using resolution the following reasoning: "Every student in the SCIS is a CS student or an IT studen
    15·1 answer
  • ____ is scientifically seeking and discovering facts.
    9·1 answer
  • Is the ability to choose the start and finish times, but they must complete a full day’s work
    8·1 answer
  • Nicole is in a study group to prepare for a test on plant biology, a subject she knows a lot about. During their meetings, she a
    8·2 answers
  • Which of the following algorithms is the same as the flowchart shown below?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!