1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slega [8]
3 years ago
7

i searched up a sus link and it asked me to download something, which I didn't. If i was just led to a website, is my computer s

till safe?
Computers and Technology
1 answer:
rusak2 [61]3 years ago
5 0

Answer:

yes

Explanation:

You might be interested in
Design a function that checks if a keyword exists in a given keyword tree and returns true if so and returns false otherwise. Af
jeka57 [31]

Answer:

Explanation:

N

7 0
3 years ago
Read 2 more answers
Which of the following statements is true of ASCII code?
Tju [1.3M]

Answer:

Option A: It includes letters and numbers.

Explanation:

ASCII is the abbreviation of American Standard Code for Information Interchange. This is a character encoding standard to represent letters (upper case and lower case), numbers and special characters (e.g. & and %).  This is an encoding standard which is recognized by all computers that enable the exchange of information between different computers become possible.

For example, an uppercase A is represented as number 65 in ASCII code.

5 0
3 years ago
Does anyone know about ICT? i need help ASAP
Lina20 [59]
ICT means, Information and Communication Technologies

ICT is a borders term for information technology which refers to all communication technologies including the Internet wireless networks, cell phones, computers, software, middleware, video-conferencing, social networking and other media applications and services
4 0
3 years ago
Which data type is 2.5?
Phoenix [80]

2.5 is a float.

Float stands for floating point. Floating point types are numbers with decimal places. I hope this helps!

6 0
3 years ago
A type of specialty processor devoted exclusively to protecting your privacy.
drek231 [11]
 Cryptoprocessor would be it.
8 0
3 years ago
Read 2 more answers
Other questions:
  • Which question best addresses the issue of risk with a new job?
    7·2 answers
  • A user has been complaining that their wireless connection has been connecting and disconnecting too frequently. what command co
    15·1 answer
  • Which of the following is true of Chinese Opera: Two opera centers emerged Beijing and Yangzhou 300-400 forms of opera arose in
    10·1 answer
  • Ann needs to share information about a new hiring policy. She needs to communicate this information to more than one hundred emp
    15·2 answers
  • PLEASE HELP ASAP!!
    11·1 answer
  • Xavier buys a computer for $525, which includes taxes. He pays for the computer over a 12-month period by paying $48.13 per mont
    8·2 answers
  • Microsoft Excel is an example of a(n) application.
    11·2 answers
  • My brainly isnt working it isnt showing and answers wats going on? wat do i do
    14·2 answers
  • 19. Fatigue can help improve your reaction time.<br> False<br> O True
    8·2 answers
  • How do people decide their ethical behavior
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!