1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
deff fn [24]
3 years ago
7

if someone has become very attached to their mobile device and feels anxious if the cannot connect to the internet, what are the

y experiencing
Computers and Technology
1 answer:
svp [43]3 years ago
4 0

Answer:

Anxiety

Explanation:

trust I have it

You might be interested in
Suggest a reason why it was constructed there?​
valina [46]
Can you post the work assigned so I can better understand?
6 0
3 years ago
he blinking vertical line that indicates where your text will appear when you type is called the ____.
Lapatulllka [165]

Answer:

Insertion point

Explanation:

in software applications that require text input, the insertion point shows where the next text will be inserted, it appears as a blinking vertical line and can be moved by the use of arrow keys or mouse click on the desired location you want it to move to, while  cursor on the other hand indicates where on the screen the user can send a command.

7 0
3 years ago
What does the acronym API stand for?
lozanna [386]

Answer: D) Application programming interface

It's like a layer that is between the programmer/program and the hardware. It allows developers to create useful programs or tools for operating systems.

8 0
4 years ago
Read 2 more answers
Logical design is tied to a specific hardware and software platform. a. True b. False
cluponka [151]

Answer:B false

Explanation:

3 0
3 years ago
Which safety issue is considered to be a data safety issue?
Andrews [41]
<span>Computer and technology-related dangers to an individual's personal, financial, emotional or physical well-being are considered as data safety issues.
There are several things you should do to prevent computer dangers: </span><span>make regular backups of files, protecting yourself against viruses (use an anti-virus software) , <span>use a  passwords so that access to data is restricted, use a firewall , </span></span>
4 0
4 years ago
Other questions:
  • 1. When you write HTML code, you use ______ to describe the structure of information on a webpage. a. a web address b. tags c. s
    6·1 answer
  • Which of the following formulas would you use to calculate the power requirements of an electrical load? 
    5·1 answer
  • What 3 types of technologies are used inside hard drives?
    15·1 answer
  • Which graphic file format is used for commercial purposes.
    10·1 answer
  • What is web <br>searching engine ?​
    9·1 answer
  • Can somebody tell me the Minecraft command to clear an entire world and destroy every block if u Dunno please don’t answer &gt;-
    13·1 answer
  • A list contains the following items: Antelope, Baboon, Cheetah, Elephant, Giraffe, Hippo, Jackal, Lion, Okapi, Warthog. ​(a)​A b
    5·2 answers
  • What is the most appropriate data type for each of these items?
    15·1 answer
  • What kind of company would hire an Information Support and Service employee?
    13·2 answers
  • The specialized programs used by the operating systems to help ensure that memory is used properly and there are no memory confl
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!