1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
matrenka [14]
3 years ago
12

Hewo want to talk! #boredWill randomly mark brainlest

Computers and Technology
1 answer:
stiks02 [169]3 years ago
8 0
To be or not to be?
That’s the question
You might be interested in
The ________________ command ends the current command session
Lemur [1.5K]

Answer:

exit

Explanation:

When the Command Prompt window is active, you can end a Command Prompt session in any of the following ways: Type exit at the command prompt. Click the Close button. Click the Control menu icon, and choose Close.

5 0
4 years ago
Read 2 more answers
Suppose you are a merchant and you decide to use a biometric fingerprint device to authenticate people who make credit card purc
luda_lava [24]

Answer:

i dont know the answer

Explanation:

3 0
3 years ago
The process known as AAA (or “triple A”) security involves three components. _____________ means ensuring that an authenticated
kirill115 [55]

Answer:

The process known as AAA (or “triple A”) security involves three components. Authorization means ensuring that an authenticated user is allowed to perform the requested action.

7 0
4 years ago
An example of an online personalized recommendation would be when:
Phoenix [80]

Answer:

A:

Explanation:

I think

6 0
3 years ago
Read 2 more answers
The period of history before the invention of writing is called
Dmitry_Shevchenko [17]

The period of history before the invention of writing is called unrecorded history.

3 0
3 years ago
Other questions:
  • Let's say that you handle the IT systems administration for your company. There's a server inside of your organization that chec
    14·1 answer
  • Which Azure service should you use to correlate events from multiple resources into a centralized repository?
    5·1 answer
  • You copy several files from one folder to another folder within the same drive. what permissions do the files in the destination
    14·1 answer
  • Which term is used to define the wires on a motherboard that move data from one part of a computer to another?
    13·1 answer
  • Where Go to set up margins on a letter
    15·1 answer
  • in a typical e-mail address, the "host" is A. an account designated by a user name B. CPU processor 2500 C. the receiver of an e
    12·2 answers
  • Написати лабараторну, на тему:Вивчення властивостей та застосування шаруватих пластиків та кермаміки
    13·1 answer
  • How would you reply to an email message you've received that has multiple recipients, all of whom you would like to see your rep
    6·2 answers
  • Consider a Dog class and a Mammal class. Which is true? Group of answer choices The Dog class is abstract The Mammal class is co
    10·1 answer
  • Collection activities acquire and extract data from the operational environment such that Processing and Exploitation can conver
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!