1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harrizon [31]
2 years ago
7

Question 1

Computers and Technology
1 answer:
Alexxandr [17]2 years ago
7 0

Explanation:

so, what do you think ?

I am sure you have used a computer or a smart phone yourself.

how many clicks or taps do you want to do before you you get what you were looking for ?

hmmmm ?

as few a possible, right ?

ideally, of course, this is one (1) click or tap.

You might be interested in
Expand and simplify the following expressions. 1/2 [ 2x + 2 ( x - 3)] *​
Lerok [7]

Answer: 2

x

−

3

Explanation:

4 0
3 years ago
What happens when a basic text file without any HTML code is opened in a web browser?
Korvikt [17]

Answer:

The text will be shown without any formatting.

Explanation:

3 0
3 years ago
Read 2 more answers
Consider the following statement, which is intended to create an ArrayList named a to store only elements of type Thing. Assume
bogdanovich [222]

Answer:

B: new ArrayList()

Explanation:

When dealing with Java syntax you always need to initialize an ArrayList object with its constructor. From the options listed the only correct option would be B: new ArrayList(). This would correctly initialize the ArrayList object but is not necessarily the recommended way of doing this. The truly recommended way would be the following

ArrayList<Thing> a = new ArrayList<Thing>()

7 0
3 years ago
Flammable and combustible materials should be stored according to: A. Their color B. Their fire characteristics C. Their size
iris [78.8K]

B. their fire characteristics

this should be fairly obvious

6 0
3 years ago
Read 2 more answers
Sarah stores data electronically.
attashe74 [19]

Answer:

Always back up your data. Prevention is the best protection.

Diversify your backups. You always want more than one backup system.

Encrypt sensitive data. Data is not always encrypted even when it's on a backup tape.

Address data security.  

Use anti-virus and email security.  

Trust the professionals

Explanation: <u>HOPE IT HELPS YOU</u>

3 0
2 years ago
Other questions:
  • Trojan Horse is a malicious program and a virus is a program. <br><br> a. True <br> b. False
    6·1 answer
  • ____ refers to data, applications, and even resources stored on computers accessed over the Internet. Answer
    5·1 answer
  • If you are working on a document and want to have Word automatically save the document every minute, what steps should you use t
    13·1 answer
  • What is output when the CarTest application is run? Why?
    11·1 answer
  • What is your favorite food
    11·2 answers
  • colby lives a very career-driven lifestyle. he works long hours and enjoys making a lot of money by working overtime. after he a
    14·2 answers
  • Consider a system consisting of processes P1 , P2 , ..., Pn , each of which has a unique priority number. Write a monitor that a
    14·1 answer
  • A homeowner uses a smart assistant to set the house alarm, get packages delivery updates, and set time on the outdoor lights. Wh
    14·1 answer
  • A) Calculate the checksum of following 2 bytes: 00110101 and 10101100, and fill in the blank:
    14·1 answer
  • Which of the following is a productivity strategy for collaboration?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!