1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leviafan [203]
3 years ago
8

NO SPAMMERS, ONLY FULL ANSWER

Computers and Technology
2 answers:
Sloan [31]3 years ago
7 0
True because the way it is set is it bla bla I just want to be able to ask a question right now
melisa1 [442]3 years ago
4 0

Answer:

true

Explanation:

You might be interested in
How can you exaggerate the height of a jump in a photograph
Nataliya [291]

If you take the photo with one person on the ground that way when they take the photo it will look like the person jumping is jumping higher then they really are.


I hope this helps

8 0
3 years ago
which quotation from the story of the fisherman in the Arabian nights' entertainments supports the theme that cleverness trumps
Greeley [361]

Answer:

Vexed with having such a bad haul, when he had mended his nets, which the carcass of the butt had broken in several places, he threw them a second time

Explanation:

SORRY IF WRONG JUST TRYING TO GET BRAINLIEST TO LEVEL UP

6 0
4 years ago
I plugged my headphones into my computer, but the sound still came out of the speakers. help!
bija089 [108]

Did you accidentally plug the headphones into the microphone section. Or is the a problem with the cord to the headphones. Or is there a problem with your ears.

7 0
3 years ago
Read 2 more answers
Large and powerful computer capable of processing and storing large amounts of business data
Nata [24]

Answer:

True

Explanation:

but no need to be large physically ;)

the important point is the computer must have a proper specification to process a large amount of data

6 0
3 years ago
Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a se
Sati [7]

Answer: A- Public Key Encryption

Explanation: The Public key Encryption is used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

7 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following is a step in paraphrasing?
    14·2 answers
  • Who like fortnite??????
    12·2 answers
  • Consider the markets for monitors, USB drives, central processing units, and Microsoft’s Windows. Assume monitor manufacturers u
    7·1 answer
  • The primary purpose of an operating system is: To provide a software interface between the hardware and the application programs
    11·1 answer
  • How does this happen on brainly????
    12·2 answers
  • You are required to copy in your attendees' emails from outside of Outlook when creating a meeting
    6·2 answers
  • Why should the Six-Step Process be considered as an iterative process?
    8·1 answer
  • How to Calculate the area of a rectangle in python
    13·2 answers
  • For each of the innovations below. Decide if it is a computing innovation or not. Part 3 Continued.
    7·1 answer
  • What 3 types of data can be entered in a spreadsheet
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!