1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luda [366]
3 years ago
12

Cmo se puede añadir amigo ??'

Computers and Technology
1 answer:
seropon [69]3 years ago
5 0

Answer:ok

Explanation:

You might be interested in
Smartphones are the top target for _______ that locks a device and then requests payment for an unlocking code.
Dafna1 [17]

Would it be "phishing?" Like, clicking a fake URL and getting hacked.

6 0
4 years ago
Which of the following careers is part of the Printing Technology pathway?
torisob [31]
Textile designer i think

6 0
3 years ago
When should you update your Transaction Register? Every time you make a transaction Daily Weekly Monthly
Veronika [31]
Do it weekly so it up to date
8 0
3 years ago
If I were to install python in kali linux on a Acer 11 Chromebook and C730 would I be able to hack python with it since I have n
Mazyrski [523]

Python isnt usually used for hacking because of it not being compiled and being slow etc. But with the correct code and training you should be able to hack with it if thats what you mean.Sorry for giving a low quality answer but your question should be clarified more.

5 0
3 years ago
with the current computer development, explain 5th areas where computer is applied for the social economic dwvelopment in societ
AleksandrR [38]

Explanation:

just want points tbh but have a good day

7 0
3 years ago
Other questions:
  • PriQueue inherits from Queue. In the implementation of the getMax() method in the PriQueue class, we need to read and write the
    5·1 answer
  • Why is technology potentially important to the banking industry? What consumer needs does it fulfill?
    15·1 answer
  • You are working on a router that has established privilege levels that restrict access to certain functions. you discover that y
    5·1 answer
  • How does kinetic energy affect the stopping distance of a small vehicle compared to a large vehicle?
    14·2 answers
  • Differentiate between the broadcasting and telecommunication
    5·1 answer
  • In PHP, the only way to output text is with echo.
    10·1 answer
  • Stella is surfing the Internet to look for affordable apartments in New York City. Every time she clicks on a link to a webpage,
    9·1 answer
  • Random letter of the alphabet for Python coding
    11·2 answers
  • Which institution developed outside the limits of the written costitution of the united states ?
    14·1 answer
  • QUESTION
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!