1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
2 years ago
11

Question 9 (1 point)

Computers and Technology
1 answer:
Dmitry [639]2 years ago
4 0

Answer:

oka you answer is the 1 one

Explanation:

I hope you pass

mark

me

brainlist

please

You might be interested in
Which statement is true about hacking?
V125BC [204]

Answer:

Hackers do so for various reasons, including the challenge of it

Explanation:

I would say it is this. Plz mark brainliest Thanks:)

7 0
2 years ago
Read 2 more answers
How do open online courses help with independent learning? (1 point)
Dominik [7]

I personally have online courses, A. seems like a fitting choice in my opinion. I hope this helps.

4 0
3 years ago
Read 2 more answers
Any part of the computer that you plug into the CPU like a phone, tablet, headphones etc. are called
gtnhenbr [62]

Answer:

usb

Explanation:

8 0
3 years ago
40 points
NNADVOKAT [17]

Answer:

repetition and balance

Explanation:

4 0
3 years ago
Read 2 more answers
Two or more computers that are linked together are called which of the following
bekas [8.4K]
I’m pretty sure it’s a network hope this helps
8 0
3 years ago
Other questions:
  • You work for a large enterprise company that handles time-sensitive information. Your supervisor has asked that you set up a con
    8·1 answer
  • ________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. black-hat gray-ha
    10·1 answer
  • What is the subnet mask ?
    9·2 answers
  • Analyze the following code. Number[] numberArray = new Integer[2]; numberArray[0] = new Double(1.5); Question 9 options: A) Sinc
    13·1 answer
  • When creating a chart or graph, which should be completed first?
    9·2 answers
  • A program that processes data submitted by the user. Allows a Web server to pass control to a software application, based on use
    11·1 answer
  • Implement function bin2dec that takes a binary number bin_num as a string argument and prints out the corresponding decimal numb
    9·1 answer
  • What are ip addresses? why are these important for forensic scientists?
    5·1 answer
  • Can you help me with my homework what should i do
    9·1 answer
  • What type casting mechanism should be used if you want to safely change (cast) a pointer type for pointing to a different object
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!