1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Georgia [21]
2 years ago
15

!!! PLEASE HELP ASAP REALLY NEED IT !!!

Computers and Technology
2 answers:
gayaneshka [121]2 years ago
5 0

Answer: B

This is honestly confusing, this is the only one that makes sense...

Leokris [45]2 years ago
4 0

Answer:

B but i would say all answers are correct and B seems the most logical

You might be interested in
What is the difference between Windows 7 and Windows 10?
Novay_Z [31]
If you have windows 7 and then change to windows 10, you will see a lot of differences like Microsoft account integration, a new start menu, new apps and a windows store, Cortana and a task view bar, you get edge in windows 10, and most important desktop and security improvements
 Hope this helps!
6 0
3 years ago
How to revive a computer if it functions in an unexpected manner?
julsineya [31]
This would depend on the issue the computer is having. 

In many cases though a simple reboot does the trick. 

If your computer is slow and glitches, try cleaning it for viruses and also clean the fans. If they are dusty the computer can overheat and that can cause it to slow while its working harder to cool down.

In other cases you may not be running the proper software compatible with your device, or programs may be outdated. Check online with the company that manufactured your computer to see if you need to install updates or change certain software. 

3 0
3 years ago
External network security threats can include management failure to support organization-wide security awareness, inadequate sec
Ganezh [65]

Answer:

The answer is "Option B".

Explanation:

In external networking, it establishes the informal links beyond the size of the firm, which supports its career, and these networks may be used for help, invaluable guidance.

This system would be a different point of view to provide the privacy protection for the system connectivity, and in the internal system protects its system protects all its data, that's why it is false.

6 0
3 years ago
What are the pros and cons of using the internet in a medical office setting?
Shkiper50 [21]
Pros: are doctors are able to educate themselves in order to diagnose a patient, it's fast and convenient to put in records, medical facilities can transfer information from different locations etc.

Cons: the system can breached, this could leak health and personal information from patients, and the power could go down, delaying the use of signing in patients and etc
5 0
3 years ago
Question 1 (1 point)
FrozenT [24]

Answer:

  1. costumes
  2. systematic thinking
  3. sensing
  4. motion
  5. cap block

Extra answers if you have more than 5 answers. (I did this before and it had more answers.)

  • stack block
  • computational thinking
  • programming
  • computational thinking

Brainlist Pls!

4 0
3 years ago
Other questions:
  • Which of the following is true? A)Checks and Debit Cards both withdraw money directly from a bank account. B)Checks are the most
    13·2 answers
  • When you are driving on a rural road, if your right wheels run off the pavement, you should hold the steering wheel firmly and?
    10·2 answers
  • A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s
    12·1 answer
  • Which statement in main() generates an error?
    15·1 answer
  • What does the "zoom tool" do in Photoshop?
    15·2 answers
  • I connected to an external hard drive to transfer some photos from my vacation. When I try to drag the photo, it bounces right b
    14·1 answer
  • The details of various measurable characteristics related to IT outcomes of a cloud environment, are typically expressed in a
    6·1 answer
  • In this exercise you will debug the code which has been provided in the starter file. The code is intended to do the following:
    8·1 answer
  • imagine that you are explaining the art of visual comparison to a group of photography students. You are mentoring. What do you
    11·1 answer
  • Which part of the ethernet address is assigned to vendors to identify the equipment?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!