1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
3 years ago
9

If you hard working right now go to this EASY question

Computers and Technology
2 answers:
e-lub [12.9K]3 years ago
7 0
Ok, where is the question so I can try my best?
stepladder [879]3 years ago
7 0
Whats the question??? Lol
You might be interested in
vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa
Nookie1986 [14]
Hi
i just saw this question and i like to answer it
true
3 0
4 years ago
Teknoloji ile ilgili 5 tane örnek yazabilir misiniz? Lütfen..
kiruha [24]

Answer:

אז מה עוד אני יכול להגיד לך בסדר אני חולה

6 0
3 years ago
if you were writing an essay about the major rivers of America which illustration would be the most helpful to your reader ​
Dmitrij [34]

Answer:A map

Explanation: (╹◡╹)

4 0
3 years ago
What tab contains the copy and paste buttons
Nina [5.8K]
Any u just get the pointer and hilight it then u paste
7 0
3 years ago
Read 2 more answers
Any information that is processed by and sent out from a computer or other electronic device is considered __________.
wel

Answer:

Your answer will be output.

Hope this helps!

3 0
3 years ago
Read 2 more answers
Other questions:
  • Carl sent an e-mail to more than three thousand employees about a software update. The employees need to prepare for this update
    7·2 answers
  • According to a case study in one of our weekly chapter reading, nearly..................... percent of all employees send work e
    11·2 answers
  • A range check that can be used in Microsoft access to calculate the data collected which is date and time
    10·1 answer
  • When defining a variable to be used to hold textual information containing multiple characters (letters, numbers, and/or symbols
    5·1 answer
  • An IT suspects that an unauthorized device is connected to a wireless network. This is a result of pastry sharing on a device br
    13·1 answer
  • FOR DIGITAL DESIGN/ PHOTOGRAPHY
    5·2 answers
  • Look at (c), is it accurate? ​
    9·2 answers
  • Can people survive without technology?
    5·1 answer
  • PLSS HELP ASAP ILL GIVE BRAINLIES THANKS
    7·2 answers
  • What does a black box represent in the system input/output model?.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!