1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DerKrebs [107]
2 years ago
14

How do you reflect yourself in the topic (filters)​

Computers and Technology
1 answer:
Gnesinka [82]2 years ago
6 0
In what topic ?? Please explain more
You might be interested in
How to bypass a Lightspeed and Rocket Filter blocked website without being a admin and without downloading extensions? Must incl
AVprozaik [17]

You really cant without being admin. Calm yaself child

6 0
2 years ago
How do you destroy data on hard drive?
Nataly_w [17]
You have to destroy the hard drive as it is like a memory for the computer so it can never be deleted
7 0
2 years ago
Read 2 more answers
Select the correct answer from each drop-down menu.
tia_tia [17]

Answer:

<dd> tag is used

Explanation:

The <dd> tag is used in HTML document to explain set of terms. The <dd> tag list is used in conjunction with the <dl> term. Inside a <dd> tag we can insert text, sentence, paragraph or links. There are 4 primary tags to build any website. Every HTML document begins and ends with HTML tag.

6 0
3 years ago
Four possible skills a person could have
cluponka [151]

Answer:

Active listening skills.

Genuine interest in others.

Flexibility.

Good judgment.

Explanation:

4 0
3 years ago
Visual basis,C, C++ and Java are all examples of computer programming ________.
mafiozo [28]
Programming languages im pretty sure
4 0
3 years ago
Other questions:
  • Explain why this scenario points towards a potential problem with BIOS.
    10·2 answers
  • You use different office apps to accomplish specific tasks, such a creating a newsletter or producing a sales presentation, yet
    8·1 answer
  • "The fact that we could create and manipulate an Account object without knowing its implementation details is called"
    9·1 answer
  • A properYour customer has connected a 1000-watt microwave oven and a 600-watt mixer to a 15-amp branch service line for the kitc
    11·2 answers
  • Which of the following is the core of an operating system that maintains the computer’s clock, starts applications, and assigns
    5·1 answer
  • RFID tags uses memory that is read-only.A. TrueB. False
    5·1 answer
  • Grandma Ester normally gives you hugs for your birthday - one for every year old you are. When you turned 15, she squished you w
    8·1 answer
  • A(n) _____________ is a system that prevents a specific type of information from moving between untrusted networks and private n
    9·1 answer
  • Short Essay on the history of Computer​
    6·2 answers
  • 6. According to camp policy, staff members need to be at least 23 years old to transport students. Dean now wants to determine h
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!