1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vampirchik [111]
3 years ago
15

What The computer needs bothandtofunction properly?​

Computers and Technology
1 answer:
ELEN [110]3 years ago
5 0

Answer:

It needs power in order to function

Explanation:

You might be interested in
Type the correct answer in the box. Spell the word correctly.
fomenos

Answer:

"a callout is a type of text box that also includes a line for pointing to any location on the document. A callout appears under the SHAPES menu of the word processing program. The answer that completes this statement is the word "shapes". Hope this answers your question."

Explanation:

8 0
3 years ago
Read 2 more answers
Which tool in Access will give you a detailed report showing the most accurate and complete picture of
Angelina_Jolie [31]

The Query tool is the tool in MS access that will give user detailed report showing the most accurate and complete picture of employee attendance grouped by day

<h3>What is the Query tool?</h3>

The Query tool helps to give answer to a simple question, perform calculations, combine data from a database

In conclusion, the Query tool is the tool in MS access that will give user detailed report showing the most accurate and complete picture of employee attendance grouped by day

Read more about Query tool

<em>brainly.com/question/5305223</em>

4 0
2 years ago
.....is used to save project in Visual basic .net from file menu
Harlamova29_29 [7]

Explanation:

I don't really understand what you're trying to get at, maybe try to abbreviate a little more?

4 0
3 years ago
(BRAINLIEST QUESTION!!!)
docker41 [41]

Answer:

Possible if hackers are not so intelligent.

Explanation:

Actually, hackers are intelligent

where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.

Normally hackers will generate different location places and by using decipher it is possible to find the location codes.

Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.

It is possible to by using decipher to get uncovered locations

4 0
3 years ago
Data administration is a special organizational function that manages the policies and procedures through which data can be mana
aleksandr82 [10.1K]
That is a true statement sir.
5 0
3 years ago
Other questions:
  • In procedural programming, where does the flow of control usually route from the main function?
    8·1 answer
  • Which of the following are the rows or columns of white space created between grids?
    7·1 answer
  • If you want to emphasize the Greek root of a word in a document, which tool in Microsoft® Word could you use?
    6·2 answers
  • An administrator running a port scan wants to ensure that no processes are listening on port 23. What state should the port be i
    7·1 answer
  • The software used to help run the computer hardware is the _____.
    9·2 answers
  • In the single-site processing, single-site data (SPSD) scenario, all processing must be done on the end user's side of the syste
    10·2 answers
  • When the continue statement is encountered in a loop, all the statements in the body of the loop that appear after it are ignore
    5·1 answer
  • A communication medium that carries a large amount of data at a fast speed is called
    6·1 answer
  • What are some ways you can give staying off your phone a "boost" and make it easier to do?
    9·1 answer
  • This feature automatically creates tables of contents.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!