1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garri49 [273]
3 years ago
13

Brainliest For Tascake Because People Texted Before Tascake Could Hurry Tascake

Computers and Technology
2 answers:
makkiz [27]3 years ago
8 0
I didn’t respond until saw the dude write
Have a lovely day luvs!
horrorfan [7]3 years ago
4 0

Answer:

Quack :^)

Explanation:

:^) :^) :^ ) eee

You might be interested in
What determines the color of a rock?
Leona [35]
Mineral type I believe
6 0
4 years ago
Read 2 more answers
Anne creates a web page and loads a CSS style script along with the page. However, the entire page appears black and she cannot
Drupady [299]

Answer: B. "She might have set backround-color in body to black in the CSS file"

Explanation: I took the test and got 100%

3 0
3 years ago
Help pls. Computer basics.
telo118 [61]
Text boxes and related tools
8 0
3 years ago
Read 2 more answers
Steven is in a meeting and he is sharing a graph on his monitor with fifty other people. So that the others do not need to crowd
nevsk [136]
The answer is D) Projector because with a projector, its in the name project so it can anything u put on their, and put it on a virtual screen that can be put on a wall, so everyone can see.
8 0
3 years ago
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY <3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
3 years ago
Other questions:
  • How does a combustion engine works?
    7·2 answers
  • How do you give the brainliest answer to someone?
    8·2 answers
  • What are use class diagram, use case description and activity diagrams for use cases?
    7·1 answer
  • Which of the following represents the biggest difference between asymmetric and symmetric cryptography?
    9·1 answer
  • Which changes should be made to establish and maintain formal writing conventions? Select two options.
    10·1 answer
  • What key do I use to start my presentation
    9·1 answer
  • What is being identified when antibodies stick to pathogens during immunostaining?
    11·1 answer
  • Antwon is building his technical writing portfolio.He created the following checklist: •check whether any part of the portfolio
    11·1 answer
  • Discuss the important role of remote sensing application in agriculture. Do you think that the use of remote sensing is applicab
    15·1 answer
  • Which of these parts of a computer produces an observable result?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!