1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
3 years ago
5

How do you get Brainliest on a question?

Computers and Technology
2 answers:
Mazyrski [523]3 years ago
8 0

Explanation:

- Honestly, it is up to the poster of the question to decide that. Sometimes, the poster doesn't even pick the Brainliest, which is okay. I can't say that there will always be a Brainliest answer, but I can give you some really good hints on the easiest ways to get Brainliest.

<em>1.) </em>Only answer a question if you really know the answer and what you are talking about.

<em>2.)</em> Give very detailed responses that are thorough and understandable.

<em>3.)</em> Try not to use slang, it sounds unprofessional and like the question was a little slapped together.

- When a user posts a question, up to 2 people can respond to try to answer the question and earn the points. Yes, the original poster does need to do that. When two people respond to a question that a user posted, the user has the option to pick the Brainliest answer out of the two. But the user can only pick that when<em> two </em>people have answered.

<em>- Another thing:</em> when someone gets awarded with the Brainliest answer, they get extra points.

- To mark someone Brailiest, press the crown symbol at the bottom right side of whichever user's answer you choose has the best.

I hope this helps.

Mama L [17]3 years ago
5 0

Answer:

yes that is the way things work and I think for the answer to be marked brainiest there must be two answers that were posted.

Explanation:

Hope this helps:)

You might be interested in
What is the best way to prevent the most common cause of network failure?
Goryan [66]
Upgrade routers and servers annually.
8 0
3 years ago
Read 2 more answers
Which of the following statements about relays is correct? A. A relay is a type of rheostat. B. A normally closed relay closes a
Sloan [31]
C. A relay is an electrical switch that works through electromagnetism. 
3 0
3 years ago
Read 2 more answers
Howard’s In The Process Of Creating A Google Display Campaign And Decides To Use Custom Intent Audiences As A Targeting Option.
Vladimir79 [104]

Answer:

Option 3 and Option 4 i.e., URLs and Keywords are correct.

Explanation:

Howard through the Phase for developing the following display project as well as determines to still use specific Purpose Viewers As just the targeting tool. He would prefer to affect consumer attention, however his limited demographic is not served by such an in-market client group.  

  • Thus, URLs, as well as keywords, are data inputs that Howard sends to better serve his viewer.
  • So, the following are the reason that describe the other options are not appropriate according to the scenario.
6 0
3 years ago
_______ and _____ are two major techniques involved in green computing. NextReset
FrozenT [24]
Green computing is the use of computers and related resources which is environmentally responsible. Energy-efficiency and e-waste are two major techniques involved in green computing. Energy efficiency involves implementation of energy-efficient central processing units (CPUs), servers and peripherals as well as reduced resource consumption. And e-waste is the proper disposal of electronic waste.


3 0
3 years ago
Read 2 more answers
Password procedures, information encryption software, and firewalls are examples of measures taken to address:
Gnoma [55]
<span>Password procedures, information encryption software, and firewalls are examples of measures taken to address are all measures taken to safeguard information security and protect users data from being tampered or manipulated by invaders. 

In web, if we leave our information without encryption or if we leave our system without firewall, different types of security threats might arise: such as, information being hacked, manipulated or sent to wrong places. To avoid this information encryption is done. We might also need to firewall our system so that we can avoid unwanted access and invading of our privacy using malwares and other tools. </span>
5 0
4 years ago
Other questions:
  • What did you include in your response? Check all that
    15·1 answer
  • Which are examples of embedded systems? Choose two answers.
    15·1 answer
  • All of the following are examples of roadblocks to achieving a goal except
    12·2 answers
  • What is the difference between C and C++. If I know C, will it be hard to lean C++?
    15·1 answer
  • A research team is studying parallel computing. They want to run parallel process without having to use multiple processors. How
    7·1 answer
  • The amount of RAM storage is measured in A: GB The rule of thumb that predicts that CPU capacity will double every 2 years is ca
    11·1 answer
  • Which mechanical switches are the loudest and clickiest?
    15·1 answer
  • Give five examples of physical networking.
    15·1 answer
  • Which memory can be removed from motherboard? RAM OR ROM?​
    7·1 answer
  • you are working in the headquarters of an organization and you're asked to deal with the interruption in services due to network
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!