1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Deffense [45]
3 years ago
13

A central issue of public sharing is:

Computers and Technology
2 answers:
Troyanec [42]3 years ago
6 0
I think is b.how much time we spend alone
Vlad1618 [11]3 years ago
4 0
I think the answer is b
You might be interested in
How can users create a shortcut to favorite websites and store them in their browser?
8090 [49]
I know the first one is A) Bookmark sites and I think the second one is B) Cross-platform capability. 
8 0
3 years ago
Read 2 more answers
You write a short story, but you want to make sure your work is protected before you post it online. What should you do to help
Mars2501 [29]
Make sure you but no copyright, author, and date of publication, that may help.
8 0
3 years ago
A computer scientist creates an app that tells you a funny joke each time you touch the Joke button.
Lena [83]

Answer:

B And A

Explanation:

B: The controller renders a responce it can be seen as a manager and other parts are its workers and makes sure that other parts are "working" well

6 0
3 years ago
What type of document is a mobile device's EULA?
MakcuM [25]
EULA stands for End User License Agreement. This document is the contract between the software application author or publisher and the user of that application. It is also called "software license", because it establishes the purchaser's right to use the software on the mobile device. T<span>he user agrees to pay for the privilege of using the software, and promises the software author or publisher to comply with all restrictions stated in the EULA. </span>
6 0
3 years ago
Which is the best response to receiving a threating text from a classmate
Yuri [45]

Answer:

send a threatening text in reply, then block the phone number block the phone number, then contact his phone service provider immediately delete the text, then report the incident to authorities ignore the message, then get a new cell phone number.

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • In an ha configuration, which two failure detection methods rely on icmp ping? (choose two.)
    12·1 answer
  • Match the items.
    15·1 answer
  • 4. True or False? Electrons flow out from the POSITIVE end of a battery. *<br> True<br> False
    7·1 answer
  • To support continuous improvement efforts in the workplace, you increase the number of tasks that an employee performs and have
    7·1 answer
  • In Web design, What kind of tag is referred to as fixed ?<br>​
    7·1 answer
  • What important practice can help prevent hardware trouble?
    6·1 answer
  • what term defines inventiveness uncertainty and futuristic ideas typically deals with science and technology
    15·1 answer
  • Match the characteristics to the mobile operating system that it describes.
    11·1 answer
  • Write a Java program called Decision that includes a while loop to prompt the user to enter 5 marks using the
    12·1 answer
  • Who invented computer ?​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!