1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kicyunya [14]
3 years ago
12

What is 2+2 I need to know hurry

Computers and Technology
2 answers:
Montano1993 [528]3 years ago
6 0

Answer:

I think it might be 4 I'm not 100% sure tho☠☠☠

Softa [21]3 years ago
4 0

Answer:

4

Explanation:

2 +2=4

because two 2's make four like two 4's make an eight

You might be interested in
What is the best application to create a slide show presentation?
Lynna [10]

Answer:

Microsoft Windows File Manager

5 0
3 years ago
Read 2 more answers
Your organization has hired a penetration tester to validate the security of your environment. The penetration tester needs to d
yulyashka [42]

Answer:

Port scanner

Explanation:

The penetration tester would most likely use a port scanner. A port scanner can be explained to be an application that is made to check a server or host for ports that are open. This application can also be used by administrators to check their security networks so as to know those network services that are running on a host and also to know existing vulnerabilities. Attackers also use this to exploit victims.

5 0
3 years ago
Which of the following are good backup methods you can use to protect important files and folders from loss in the case of a har
grigory [225]

Answer:A,B, and D

Explanation:

6 0
3 years ago
Read 2 more answers
For most usb devices, power is supplied via ____.
ser-zykov [4K]

For most usb devices, power is supplied via the port.

3 0
3 years ago
With the help of technology students will benefit greatly from studying by themselves at home. Do you agree or disagree with the
cestrela7 [59]
I disagree because when kids are home alone, and you think they are studying they might not be and they will be playing games on the computer.
6 0
3 years ago
Read 2 more answers
Other questions:
  • If you quote an author from a website in a paper, it will be important to create a _____ in your writing to give them credit for
    7·2 answers
  • Write the definition of a method printDottedLine, which has no parameters and doesn't return anything. The method prints to stan
    12·1 answer
  • Ethics is a way of behaving so that you are
    7·2 answers
  • View the attached picture
    7·1 answer
  • Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate serv
    11·1 answer
  • Eliza needs to share contact information with another user, but she wants to include only certain information in the contact. Wh
    9·2 answers
  • Queremos conectar una pila de 4,5 V a un diodo LED cuya tensión de trabajo es de 2 V. Calcula cuál debe ser el valor de la resis
    8·1 answer
  • Order the steps to use a logical argument as a rule type.
    15·2 answers
  • Davingould1115...................answer 3​
    11·1 answer
  • Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are calle
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!