1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
2 years ago
14

SOMEONE PLEASE HELP ME OUT WITH!!!!!

Computers and Technology
2 answers:
Olin [163]2 years ago
8 0
I’m pretty sure it’s the second one. that’s what i’d choose
alex41 [277]2 years ago
6 0
I’d chose the second one
You might be interested in
Complete the steps for adding a recurring event.
daser333 [38]

Answer:

which type of questions is this

7 0
2 years ago
Which components exist in the contextual tab for tables called Design? Check all that apply. Table Styles Export Table Data Prop
EastWind [94]

Answer: table styles, properties, tools, external table data, table style options

Explanation: i took the assignment

4 0
3 years ago
Read 2 more answers
I'll pay 50 dollars to anyone who can do this leave your snap after answering doing it and ill cash app it
gladu [14]

Well for must cases it is the Ram of the system and the processor I will show you how you can get rid of slow processing

  1. Run the task manager then try to stop some running programs
  2. the antivirus sometimes slows the computer due to the processing power it takes.
  3. I would recommend that all program should be closed from the task manager and close some running apps in the system settings go to start up and then close it now you are good to go.

5 0
3 years ago
o maintain reasonable key security (mark all that apply): Ensure that someone else always has an extra key. Ensure that no extra
Komok [63]

Answer:

The answer is "second, third, and fourth choices"

Explanation:

In the question the numbering of the choices were missing if we numbering the choices so, the first choice will be one first number and second choice is in second and so on, and its explanation can be defined as follows:

The network safety key is a type of network login credentials or passwords which is used for provides authorization as well as access the network or device upon which client requests to communicate throughout the form of physical, digital, or biometrical information login.  

  • It doesn't ensure the extra key.  
  • It helps ensure there were no additional duplicates.  
  • It keeps strict access codes as well as keys command.  
  • It makes sure, that its key could not be linked to able to operate the lock.
6 0
2 years ago
Consider the scenario below and determine the most likely source of the problem. A user reports that her or his printer is not r
Lina20 [59]
The answer would be D.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Format Painter cannot be used to copy only character attributes. True or False
    12·1 answer
  • Which string method counts the number of characters in a string?
    5·1 answer
  • If you have a windows 8, but want the features of windows 8 pro, purchase and install _______.
    7·1 answer
  • What is the principal goal of data science?<br>​
    5·1 answer
  • Declare an ArrayList of Strings. Add eight names to the collection. Output the Strings onto the console using the enhanced for l
    9·1 answer
  • Example of Not a computer characteristics example
    12·1 answer
  • How do i stop my computer from automatically connecting to a wireless network
    5·1 answer
  • The ratio of sparrows to bluejays at the bird sanctuary was 5 to 3 If there were 15 bluejays in the sanctuary, how many sparrows
    12·1 answer
  • Digital communication and production chapter 17
    6·1 answer
  • "necessarily is the mother of computer " justify this statement with respect to the evolution of computer.​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!