1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Salsk061 [2.6K]
3 years ago
9

What is the answer ????​

Computers and Technology
1 answer:
zzz [600]3 years ago
5 0

Answer:

august po

Explanation:

pabrainliest ty

You might be interested in
What is one concern associated with web-based applications?
damaskus [11]

Answer:

Security

Explanation:

If you dont have security, all the other will be broken, its like laws of physics

5 0
3 years ago
How does the discussion of “Luddites,” “Marx,” and “John Maynard Keynes” in paragraph 21 contribute to the development of the id
gavmur [86]

Answer:

d

Explanation:

6 0
3 years ago
Explain what mistake Miranda made in the following scenario. Situation: Miranda suspects that there may be a problem with the ha
Dennis_Churaev [7]

Answer: Answer below.

Explanation:

I'm not fully sure myself, so don't agree with me fully.

I believe what she may have done wrong is tell the technician about a "program." A program doesn't have to do anything with physical hardware.

5 0
3 years ago
Read 2 more answers
Alex is nearing graduation. His counselor showed him this information. Alex's College Costs & Payment Options per Year Costs
Pie

Answer:

A

Explanation:

In my opinion, it is best he works the extra $1300 which wouldn't require him to abandon his college plans, wait an extra year or get himself into the trouble of loans.

Cheers

6 0
3 years ago
Read 2 more answers
Lesson 1 (4.0 points)
sesenic [268]


3. Hold down the CTRL, ALT, and DELETE keys simultaneously, click Task Manager option, then right-click the frozen program's name, and finally click the end task button.


8 0
3 years ago
Read 2 more answers
Other questions:
  • Q3** Write a query to create a new price list for books written by the same author. Allow the user to enter only the first 4 let
    15·1 answer
  • There are many differenttypes of models, but an individual DSS can consist of onlyone.
    15·1 answer
  • How many host ip addresses are available on a network with a subnet mask of 255.255.255.192?
    6·1 answer
  • ​printers, monitors,​ tablets, cpus, and laptops are examples of​ ____________.
    14·1 answer
  • Refer to the exhibit. the gigabit interfaces on both routers have been configured with subinterface numbers that match the vlan
    11·1 answer
  • Movies may depict larger-than-life situations, such as calamities, superheroes, and spaceships. A helps show such extraordinary
    11·1 answer
  • What is hydraulic fracturing?
    7·1 answer
  • The benefit of host and guest operating system difference is:
    8·2 answers
  • 1. Which of the following cables are used in networking? Check all that apply.
    8·2 answers
  • Mingji is working to transfer photos from her digital camera to her computer. While
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!