1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelechka [254]
3 years ago
5

Contact Us Save

Computers and Technology
1 answer:
svetoff [14.1K]3 years ago
3 0
All except drinking caffeinated beverages:)))
You might be interested in
How do you fix this windows 7 screen​
tensa zangetsu [6.8K]

Try restarting it. If you can’t restart because the screen is frozen maybe just turn it off and back on. If you already tried restarting and it still didn’t fix the problem, just give it some time. The computer will reset itself eventually which should fix the problem.

6 0
3 years ago
Your computer uses 4 bits to represent decimal numbers (0, 1, 2, 3 and so on) in binary. What is the SMALLEST number for which a
natali 33 [55]
2 I think because 2 I think is binary I’m sorry if this is wrong
8 0
3 years ago
Write c program to check character is alphabate or not?​
Elan Coil [88]

Lookup the isalpha() function in the C standard library, this function will check and return non-zero for alphabetic characters.

8 0
3 years ago
What type of html list will automatically place a number in front of the items?
yarga [219]

An ordered list.


<ol>
    <li> This is the first item.
    <li> This is the second item.
</ol>

5 0
4 years ago
A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.
Lunna [17]

The answer to this question is a firewall. A Firewall is a network security system that blocks and prevent unauthorized use or access of company’s network. Firewall is also a program that screens and restricts viruses and other users like hackers to reach the network through the internet. 

3 0
4 years ago
Other questions:
  • Marie uses a browser to visit a blog. What is the unique identifier of the blog?
    5·1 answer
  • Each peripheral device has its own software, called a(n) ____, which contains the detailed instructions required to start that d
    6·1 answer
  • Dfd symbols are referenced by using all ____ letters for the symbol name.
    9·1 answer
  • A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company n
    9·2 answers
  • Suppose your friend, who is a small business owner, wants to computerize her business functions such as accounting, payroll, and
    7·1 answer
  • PLEASE PLEASE PLEASE PLEASE HELP ASAP!!!!! I PROMISE I WILL GIVE YOU A BRAINLIEST FOR THE CORRECT ANSWER PLEASE HELP!!
    9·2 answers
  • Building relationships during your career exploration is called
    6·1 answer
  • What percentage of people with internet access use emojis?
    11·1 answer
  • We want to transmit 40 packets and the following packets are getting lost, 3,9, 25,28, 35. How many rounds are needed if
    5·1 answer
  • Which storage is faster than secondary storage​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!