1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lubov Fominskaja [6]
3 years ago
11

Help pls lol..image below

Computers and Technology
2 answers:
AfilCa [17]3 years ago
5 0

Answer:

I think the answer is A

Explanation:

kogti [31]3 years ago
4 0

Answer:

B or C I don't know

so I guessing

You might be interested in
What is that tool that makes liquid metal? It is used for wires, Ik I might sound dumb but I'm rlly curious​
Alex_Xolod [135]

Answer:

A blow torch?

Explanation:

4 0
3 years ago
Do the police check your mobile device during police checks?
Marat540 [252]
it depends............

4 0
3 years ago
Read 2 more answers
Which attribute of the use of color improves the visual appeal and user understanding of different elements of a web page?
Charra [1.4K]

Answer:

Contrast

Explanation:

Contrast between different colors on web page helps increase readability and user experience.It can assist user in better understanding website structure. Generally contrasting colors enhance readability as the are more distinguishable from other color.White text on yellow background would be less readable than on black background, due to low contrast between yellow and white.

7 0
4 years ago
What landforms are likely to form at this boundary
Paha777 [63]
<span>Landforms that could be created at convergent boundaries would consist of: volcanoes, mountains, trenches, volcanic islands, and even deserts could result from effects of converging boundaries. The landforms are mountains.</span>
3 0
3 years ago
Pointsfor a failover cluster, what type of network would you use to communicate with an iscsi device?
guajiro [1.7K]
A local Network..........
8 0
3 years ago
Other questions:
  • __________ is a protocol used by e-mail clients to download e-mails to your computer.
    14·1 answer
  • A __________ is when the sender cryptographically marks a message with its private key, which is achieved by a cryptographic alg
    12·1 answer
  • True or False <br><br> Rootkits are only made by black-hat hackers.
    8·1 answer
  • Which of the following correctly declares and initializes a Scanner object that will use input from the keyboard as its data sou
    13·2 answers
  • Which XXX will prompt the user to enter a value greater than 10, until a value that is greater than 10 is actually input?
    14·1 answer
  • Please help i will give you brainlest!!!!!!!!!
    6·1 answer
  • Advancing technology has made life easier for people and businesses today. Imagine that you have to work for an entire day witho
    11·1 answer
  • Consider a computer that uses 5 bits to represent positive integers and uses all 5 bits to represent the value.
    9·1 answer
  • Indonesia is planning to move its capital from Jakarta to the island of Borneo in the hope that the burden of congestion, regula
    13·2 answers
  • A project manager has designed a new secure data center and has decided to use multifactor locks on each door to prevent unautho
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!