1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gennadij [26K]
3 years ago
10

IF ANYONE ANSWERS YOUR QUESTION WITH SOMETHING LIKE THIS:

Computers and Technology
2 answers:
vova2212 [387]3 years ago
4 0

Answer:Thank you very much! A user names SShalomeea has been hacking today. Anyone with that photo is a spammer.

Serga [27]3 years ago
4 0

Answer:

oh ok thank you for the heads up

Explanation:

You might be interested in
7. A patent is an example of a rare and valuable resource. Indicate whether the statement is true or false and also justify it.
mamaluj [8]

Answer:

True.

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of trademarks, copyright and patents.

Hence, a patent is an example of a rare and valuable resource because it protects the intellectual property of an individual or business entity and as such serves as a medium for gaining royalties or valuable economic benefits.

7 0
3 years ago
Which type of backup ensures you capture a complete snapshot of everything that makes your computer run?.
Elanso [62]

Answer:

Answer is D / If not : A full image backup, or mirror backup

Explanation:

is an exact replica of everything on your computer's hard drive, from the operating system, boot information, apps, and hidden files to your preferences and settings. Imaging software not only captures individual files, but everything you need to get your system running again.

Thanks for asking this question. If my response helped, please mark as brainliest. Thank you!

5 0
3 years ago
Brief description email etiquette​
Solnce55 [7]

Answer: See explanation

Explanation:

Email etiquette is defined as the code of conduct which helps to guide the behavior when people send or respond to emails. Some of ail etiquette include:

• Using proper and correct grammar and punctuations.

• Replying quickly too emails.

• Including a clear and direct subject.

• Proofreading of messages.

• Cautious with humour.

• Sending of smaller files and compressing large files.

7 0
3 years ago
Computer programs typically perform three steps: input is received, some process is performed on the input, and output is produc
-Dominant- [34]
True. Most basic programs follow this structure.
6 0
1 year ago
What are ways to enter a formula in Excel? Check all that apply. Click on the Function Library group and select a function from
zhenek [66]

Answer:

A. Click on the Function Library group and select a function from the drop-down menu.

B. Click on the Function Library group and Insert Function.

E. Type = into any cell.

F. Click on the formula bar above the cells.

3 0
3 years ago
Read 2 more answers
Other questions:
  • When you see a blank pointer this means you can drag the row or column border to change height or width
    14·1 answer
  • Write a statement to add the key Tesla with value USA to car_makers. Modify the car maker of Fiat to Italy. Sample output for th
    9·1 answer
  • When a defendant pleads guilty to one offense just to have another offense dropped, this is what type of plea bargain
    12·2 answers
  • An adiabatic capillary tube is used in some refrigeration systems to drop the pressure of the refrigerant from the condenser lev
    15·1 answer
  • An outline is most like which of the following?
    6·2 answers
  • You should always assign the Needs Met rating before assigning the Page Quality rating, T or F ?
    6·2 answers
  • • Suppose an application generates chunks of 40 bytes of data every 20 msec, and each chunk gets encapsulated in a TCP segment a
    5·1 answer
  • Why does each record need a unique ID number?
    5·2 answers
  • Star and peer-to-peer are types of
    9·2 answers
  • Moving images of real event​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!