1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stels [109]
3 years ago
10

Identify the parts of it, Give at least three web browser that you usually used to visit a website.​

Computers and Technology
1 answer:
Neporo4naja [7]3 years ago
5 0

Answer:

Chrome, Safari, Microsoft Edge

Explanation:

Web browsers such as Chrome, Safari, Microsoft Edge would allow you to visit a website  

You might be interested in
computer hardware without software is useless while computer software without hardware is meaningless. explain what do you under
Rainbow [258]

Answer:

That the software is useless

Explanation:

6 0
3 years ago
Typically, you need to score _____ or higher on an AP exam to receive college credit for the AP course in the subject tested by
ss7ja [257]

the answer is A). 3 or higher

7 0
3 years ago
Read 2 more answers
What do you observe on the filter paper strip after 2 to 3 hours?
just olya [345]
Is there pictures or anything esle to read in order to figure out the answer

5 0
3 years ago
Read 2 more answers
Which functions can you use to find the square root of a number, and to find the current date, respectively?
JulsSmile [24]

1. A. the SQRT is the squareroot. 2. may be C. Today but I've never heard of a function that returns the date!

8 0
3 years ago
Read 2 more answers
You want to use a terminal emulation program to terminal into a series of Cisco routers. You will be managing these devices remo
vampirchik [111]
If a terminal emulation program is used and the devices should be reotely managed, then you should use the Telnet protocol. <span>Telnet is a simple, text-based network protocol that is used for accessing remote computers over TCP/IP networks like the Internet. </span>It allows the user access<span> to a text terminal and all its </span>applications<span> such as command-line for example. </span>

7 0
3 years ago
Other questions:
  • Brenda wants to finish her presentation with a summary slide . She wants three key messages to appear on each of the photo clips
    6·2 answers
  • An attribute whose value uniquely identifies an object is called a(n) _______.​
    15·1 answer
  • Need answers for 11&amp;12. Due today. Thanks.
    14·1 answer
  • Which network topology requires terminators at the ends of the backbone cable?
    6·1 answer
  • People use a computer connected to the internet to manage financial accounts
    15·1 answer
  • Can someone help me with this one
    9·2 answers
  • Methods inherited from the base/super class can be overridden. This means changing their implementation; the original source cod
    5·1 answer
  • You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use?A. 255.25
    12·1 answer
  • What is python, the coding language
    6·2 answers
  • ; This program replaces the value in R0 with its absolute value. ; ; It does NOT modify any other registers! ; .ORIG x0200 START
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!