1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gogolik [260]
3 years ago
6

I need to send this in ASAP

Computers and Technology
2 answers:
maria [59]3 years ago
6 0
The first one is an ampersat or more commonly known as an at symbol that is typically used to mention or forward someone something as an address sign.
The second one is percent (a percentage symbol) that is commonly used in mathematics to indicate a ratio out of 100.
The third one is an asterisk that is used to indicate an omission or use in writing and printing as a reference mark.
The fourth, the last one is an octothorope also called a number sign or pound sign that may signify numbers over the phone or used to classify/categorize accompanying text like in social media as a hashtag.
NISA [10]3 years ago
5 0

Answer:

YES

EYES

Answer:

YES

EYES

Answer:

YES

EYES

Answer:

YES

EYES

Answer:

YES

EYES

Answer:

YES

EYES

Answer:

YES

EYES

You might be interested in
4.which pre-defined feature is known as functions in Excel?<br> a.formula<br> b.property<br> c. data
lesya692 [45]

Answer:

I think formula?

Explanation:

8 0
3 years ago
If it malfunctions and I can throw it, then it's a hardware problem; if I have to yell at it because there is nothing to pick up
kobusy [5.1K]
Software problem.
Assuming "Software" is one of the available answers.

3 0
3 years ago
Read 2 more answers
A security specialist discovers a malicious script on a computer. The script is set to execute if the administrator's account be
levacccp [35]

The security specialist has discovers a malicious script on a computer known as a logic bomb.

<h3>Is logic bomb a type of malware?</h3>

A logic bomb is known to be a form of a malicious program that is set up or ignited if a logical condition is met, such as after a series of transactions have been done, or on a given date.

Therefore, The security specialist has discovers a malicious script on a computer known as a logic bomb.

Learn more about malware from

brainly.com/question/399317

#SPJ1

7 0
2 years ago
Match the image to its type.
kotykmax [81]

Answer:

The image type is a bitmap image.

A bitmap image is made up of bits/pixels and color depth information on the each pixel. Bitmap images can be in JPEG, GIF, or SVG format.

In order to find out if this was a bitmap image, the method applied was to zoom in closely into the image and notice the tiny squares called pixels which come together to make the image.

Learn more :

6 0
3 years ago
Hiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
Marianna [84]

Answer:

hello

Explanation:

how are you?

7 0
3 years ago
Other questions:
  • Which data type uses more memory an integer or an unsigned integer?
    6·1 answer
  • A paradigm innovation occurs when:
    6·1 answer
  • How do you know when a spreadsheet object is active in a powerpoint presentation?
    11·1 answer
  • Write a program in java that reads each line in a file, reverses its characters, and writes the resulting line to another file
    15·1 answer
  • Which technique records a signal with a video that uniquely identifies every frame of the tape using a time stamp in hours, minu
    11·1 answer
  • Why save html documents as lowercase.?
    9·1 answer
  • How do you change the Background image or picture on Windows desktop?
    9·1 answer
  • Describe the conventional method of data processing​
    12·2 answers
  • What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.
    9·1 answer
  • What type of e-mail typically lures users to sites or asks for sensitive information?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!