1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wel
3 years ago
12

Cual es de las siguientes pertenece al software de una computadora

Computers and Technology
1 answer:
Mamont248 [21]3 years ago
7 0

Explanation:

a sjsjsjsijdjdnjjjjururueu

You might be interested in
Make a list of at least 5 business ideas that interest you. Then explain which one you think is the best opportunity for you. Gi
SashulF [63]

Answer: Veterinarian

Explanation: Schooling would be interesting for my interest in animal's. The payment is good for the subject and placement you might be in but also you get to be around a bunch of weird animals lol

6 0
3 years ago
How does a clock work
Free_Kalibri [48]

Sets of gears move inside of it that persicely move the hands onto the time. That's why watches can be so intricate and valuable.

If your looking for how to read one, it's pretty straightforward if you look it up online.

3 0
3 years ago
Read 2 more answers
In a function name, what should you use between words instead of whitespaces?
Tom [10]
2. Identify the function of computer hardware components 
3 0
4 years ago
A single line text input control with an initial value as +971
Nezavi [6.7K]

Answer:

What's about this initial value equal to 971

Explanation:

\sqrt{2}

8 0
3 years ago
Of the listed principles, which process would transpire if a user provides a correct username and password?
kompoz [17]

Answer:

then the system will automatically grant access to that individual

Explanation:

Regardless of the system, a username and password are credentials used in order to prevent unauthorized access to the system. Therefore if a user provides the correct username and password when prompted, then the system will automatically grant access to that individual, since the account that they have logged in correctly as is already registered as an authorized account within the system.

5 0
3 years ago
Other questions:
  • Spencer is a recent graduate who finds a dream car that costs $45,000. Even better, there's a 0% APR for 36 months offer from th
    13·1 answer
  • Write a program that opens a text le called quiz.txt for reading. This le contains a single line with a student's rst name then
    15·1 answer
  • _____ is a method of access control that prevents unauthorized users from using an unattended computer to access the network and
    6·1 answer
  • Consider the following two implementations of the same algorithm, each written in a different language.
    11·1 answer
  • How to create a tender statement in database management?
    5·1 answer
  • Saved
    5·1 answer
  • Which of the following is time-dependant? Group of answer choices
    8·1 answer
  • ____ is scientifically seeking and discovering facts.
    9·1 answer
  • (Giving brainliest to best answer, don't make an answer if you don't know or its jumble)
    11·2 answers
  • Mention the usage of crop concept in ms-word​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!