1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
2 years ago
11

Question 9 (1 point)

Computers and Technology
1 answer:
Dmitry [639]2 years ago
4 0

Answer:

oka you answer is the 1 one

Explanation:

I hope you pass

mark

me

brainlist

please

You might be interested in
You are asked to write a program that will display a letter that corresponds with a numeric rating system. The program should us
Mice21 [21]

Answer:

rate

Explanation:

6 0
3 years ago
Identify 3 ways mobile phone could be used to contact a bank apart from making a phone call to the bank
Zepler [3.9K]

Answer:

1. Email

2. Website

3. Customer service

8 0
3 years ago
Which is usually the smallest computer?
WITCHER [35]
I would have to say it would be a PDA, because they generally arent much bigger than a cell phone. at least mine is pretty small anyway. there are certain brands that make larger ones almost the size of a tablet, but in general terms, PDAs are usually pretty small. hope this helps.
7 0
3 years ago
WILL GIVE BRAINLEST!!!!!!
Nataliya [291]

Answer:

a. divide the viewfinder into three equal, vertical divisions

Explanation:.

4 0
2 years ago
Read 2 more answers
List 2 negative impacts of cybersecurity.<br><br><br><br>Answer and I will give you brainiliest ​
Nitella [24]

Answer:

Cyber security can be used for good but nevertheless some people will find ways to do bad things. Basically the negative impacts of cyber security is the opposite to the good type of cyber security they take advantage of it and exploit computer system to do what they want. An example to this is planting a malware on the victim's computer or using a DDOS attack on a WiFi router the possibility are endless.

5 0
3 years ago
Other questions:
  • Will an email sent from a phone say it was sent from your phone
    5·2 answers
  • To have the most impact when using email, you should structure your messages so that
    5·1 answer
  • A small business has suffered from a cyber attack, what could be the resultant damage​
    10·1 answer
  • What are control layouts? What are the two primary control layout options?
    13·1 answer
  • A recursive method may call other methods, including calling itself. A recursive method has:
    7·1 answer
  • We can use formatting before and after typing.​
    8·1 answer
  • Write a function that dynamically allocates an array of integers. The function should accept an integer argument indicating the
    8·1 answer
  • Explain to Alana why she might not want to blast her boss on social media just yet.<br>​
    6·1 answer
  • Electrical data suitable for transmission is called a(n)
    5·1 answer
  • Which of the following best describes the impact of Creative Commons?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!