1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ZanzabumX [31]
2 years ago
14

Please help me!! i’m so confused on this

Computers and Technology
1 answer:
DaniilM [7]2 years ago
8 0
D I really hopes this helps
You might be interested in
Lol fortnite really going UwU and anime
svp [43]

Answer:

epic

Explanation:

7 0
3 years ago
Read 2 more answers
Which of the following is not a concern that has come out of the widespread adoption of the Internet?
slamgirl [31]

Answer:

The correct option is;

Selecting the correct browser to use for the sites you want to visit

Explanation:

Censorship of information is the subduing of information based on the consideration of such information being harmful or inconvenient

Increased anonymity

Making an individual anonymous which is one of the capabilities of the internet, is seen as encouraging unethical behavior and promoting discussions which are deemed uncivil in a commonly shared space online.

Unauthorized sharing of copyrighted information

The sharing and distribution of copyrighted material is against the law but it is a common occurrence and in various formats online

Out of the given options, selecting the correct browser to use for the sites you want to visit is the one that is not a concern.

5 0
3 years ago
How are cars made in georgia
Talja [164]

Answer:

Its same everywhere.

7 0
4 years ago
What's it called when a program is expandable?
sashaice [31]
Its called a genesis program
6 0
3 years ago
This might sound crazy! But please help.
aliya0001 [1]

Answer:

You Probably should’nt do that

Explanation:

8 0
2 years ago
Other questions:
  • While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes
    7·1 answer
  • I need help to find out what is wrong with this program and my variable, "exponent" comes out as 0 in the output instead of the
    14·1 answer
  • Match the web development languages to their type.
    13·1 answer
  • .exe, .msi, .msp, .inf - together, what do these filetypes indicate
    12·2 answers
  • Methods used to change variables are called ______. equals accessors toString void mutators
    5·1 answer
  • Chapter 7 presents a comparative analysis of various tools useful in policy making. Select two tools described in chapter 7 from
    12·1 answer
  • What is a feature of audio editing software
    11·1 answer
  • No careers combine more than one value
    7·1 answer
  • Who like the videos where is clown is from :)
    6·1 answer
  • Speed and security are advantages generally associated with<br> networks.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!