1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goblinko [34]
3 years ago
6

Amaya is curious how her computer actually boots up. Which of the

Computers and Technology
2 answers:
AleksAgata [21]3 years ago
6 0
She should press OROM
satela [25.4K]3 years ago
3 0

Answer:

Options 1, Ram

Explanation:

That's how a computer works.

You might be interested in
For which is a chart legend used?
Sidana [21]
From the data I gathered I would conclude that C is the correct answer.
3 0
4 years ago
The application window controls include: minimize, maximize, and close<br><br> A) true <br> B) false
Arlecino [84]

Answer:

True

Explanation:

Look at the top right of your computer while having a chrome tab open. You will see a line, a box, and a x. Hover over each and you can see the names.

6 0
3 years ago
Please help lots of points worth
Artemon [7]

Answer:

i dont rlly know the first one i mean i guess you cud say the last one? i dunno  srry but the 2nd one is definitively    is Laura woke up to the alarm clock screaming

Explanation:

6 0
3 years ago
Placeholders for fields such as "Last Name" and "Address" would be inserted into which
MrMuchimi

Answer:

Explanation:

The last name goes inside the main body of the mail specifically at the "closing block".

While the Address is inserted into the Subject Line specifically to the "To block"

7 0
3 years ago
The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
Bogdan [553]

Answer:

Change default username and password.

Explanation:

The corporation under which Derek works has assigned him an assignment of establishing and safeguarding a SOHO router. He intends to ensure that maybe the wireless connection is protected and no further unauthorized person would connect the device to the router. So, the first task is to simply change the username and password that the wifi routers will be secured.

So, the following answer is correct about the given scenario.

6 0
3 years ago
Other questions:
  • Your friend wants to know about Microsoft Expression Web 4. Which of the following terms will you use to describe Microsoft Expr
    5·1 answer
  • ____________________ software is a type of security software designed to identify and neutralize web bugs, ad-serving cookies, a
    8·1 answer
  • Drag the tiles to the correct boxes to compete the pairs.
    12·2 answers
  • Write a short program that uses a for loop to populate an array. The array can store up to 10 integers. Modify the code slightly
    12·1 answer
  • Write HTML code for inserting an image "cricket.jpeg" in size 500 width and 400 height.
    12·1 answer
  • 2min speech on can teachers be replace by technology​
    5·1 answer
  • Which of the following is not System Software?
    5·1 answer
  • Write a structured algorithm that prompts the
    9·1 answer
  • Block elements start a new line when rendering? (true or false)
    7·1 answer
  • Star and peer-to-peer are types of
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!