1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sholpan [36]
2 years ago
8

By definition, a computer

Computers and Technology
1 answer:
lapo4ka [179]2 years ago
5 0

Answer has a screen

Explanation:

a computer has a screen

You might be interested in
Which of the following is NOT a characteristic developed by New Journalism?
krok68 [10]
Flashy page layouts
7 0
3 years ago
Which is a example of fixed expense <br><br> -food<br> -clothing<br> -entertainment<br> -rent
Artemon [7]
Salutations!

<span>Which is an example of fixed expense?

Rent is an example of fixed expense, It doesn't matter whether you sell a widget or produce thousand of them, you must still pay the rent in any </span><span>circumstances.
</span>
Hope I helped.
6 0
4 years ago
Read 2 more answers
Describe three ways to call attention to the text on a web page.
vichka [17]

Answer:

Underline the important text.

Make Links a Different Colour.

Making visual adjustments such as making text bold, making it italicized, making it ALL CAPS.

8 0
3 years ago
What is an audit trial
Nastasia [14]

Hi there!

A audit trial is a report of changes that have been obtained to a file or some kind of database.

Hope this helped!~

7 0
3 years ago
To include calculated fields in queries, enter a name for the calculated field, a(n) ____, and then the expression in one of the
Oliga [24]

Answer:

Colon(:) is the correct answer.

Explanation:

The colon(:) is used to contain those fields which is calculated in the queries. In other words, the colon is used to insert the name for that field which is calculated then, the user uses the colon(:) and after that, he uses the expression in the columns or the field row. So, That's why the following option is true.

3 0
3 years ago
Other questions:
  • What are the two different frequencies WiFi operates on?
    9·2 answers
  • What method of malware infection installs malware through use of a separate browser window that opens uninvited from a Web page?
    7·2 answers
  • Learning about public speaking can help improve your ________________.
    15·1 answer
  • Describe some advantages of a 64-bit versus 32-bit version of windows.
    9·1 answer
  • What is the communications activity of the Internet called
    15·1 answer
  • What do you need to do before you can sort and filter data in a data base?
    12·1 answer
  • Which do switches create?<br> Networks<br> Wireless access points<br> Routes<br> Collision domains
    13·1 answer
  • While reviewing system logs, a security analyst notices that a large number of end users are changing their passwords four times
    13·1 answer
  • Which of the following is the BEST solution to allow access to private resources from the internet?
    9·1 answer
  • Is prediction harmful or not , why​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!