1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivanzaharov [21]
3 years ago
11

Anyone wanna talk im 13 eboy single

Computers and Technology
2 answers:
arsen [322]3 years ago
6 0

Answer:

Wth

Explanation:

i'm confused but hi i'm Jake ? and i don't know you so i'm not sharing my age....  :P

Bumek [7]3 years ago
4 0

Answer:

MEEEEEEEEEEEEEE

i am Sophia. I prefer Sophie. I am 14 y/o. i am in 7th grade.

this is me

You might be interested in
If Word finds a potential error in a document, a red, green, or blue wavy underline flags the problem.
dlinn [17]
As for this problem of true or false, the most probable answer the most likely one to be the correct answer would be A. True.

In Microsoft Word, or commonly referred to as MS Word, or simply Word itself as what is utilized in the problem, the program has the ability to recognize in spelling and grammar. When a red wavy underline is present, the word or words above it are usually wrong in spelling. Though this can be corrected by the user by adding the word in the dictionary so as not to be corrected in the future. The green one would be more about grammar. The blue wavy underline would indicate a word spelled correctly, but might be misused in the sentence it belongs. This usually happens to words that are almost identical in spelling like too and to.
8 0
4 years ago
Using caller id is part of which step in an effective time management plan
timurjin [86]
The answer is avoid distractions.  <span>Using caller id is part of  step to avoid distractions in an effective time management plan.  </span><span>Today with caller ID available you can identify your callers. When you are focused on your task at hand and the time you have to accomplish it, you must learn to better control the telephone. </span>
5 0
4 years ago
Simple mail transfer protocol (smtp) uses the well-known port number ______________ by default.
Elden [556K]
I believe it's default is port 587. 
8 0
4 years ago
Read 2 more answers
Choices.
Svet_ta [14]

Answer:

1. B

2. D

3. C

4. A

5. B

Explanation:

1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."

2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.

3. Virus is a software program that can infect, damage and disrupts the whole computer system.

4. To protect the whole computer system, the software utility which is needed is an Anti-virus.

5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.

7 0
3 years ago
Which of the following sentences is written in the active voice
STALIN [3.7K]
D. The chocolate cake will be served to the queen. This is the only one not in past tense. Active means present or near present, hence the word "will." 
3 0
4 years ago
Read 2 more answers
Other questions:
  • A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To ac
    11·2 answers
  • 2. What are the pros and cons of Toyota structure?
    13·1 answer
  • Assume you have an Access database with five different tables, including various pieces of information about your client base. Y
    9·1 answer
  • User Interface Design ensures that the interface has elements that are easy to ________________. (Choose all that apply)
    10·2 answers
  • MORE FREEE POINTS AYEEE
    7·2 answers
  • PLZ HELP What will be the output? class num: def init (self.a): self. number = a mul* __(self. b) return self. number + b. numbe
    7·1 answer
  • In an executing process, the program counter points __________.
    15·1 answer
  • How to write my name in binary code ? Rivas
    7·2 answers
  • Please help me excel questions!​
    6·2 answers
  • Design algorithm and the corresponding flow chart for adding the subject score of 5, total value and rank.​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!