Answers on questions: Computers and Technology

Computers and Technology
maureen07
38
GIMP's official website is _____
Answer
Answers (1)
Computers and Technology
JonaBerey
12
Need help with b and c
Answer
Answers (1)
Computers and Technology
aaa159951twtw
17
How are 3D microscopes and regular cameras the same
Answer
Answers (2)
Computers and Technology
drvmms
12
PLEASE HELP!! HELP ME
Answer
Answers (1)
Computers and Technology
veronicazeledon
16
When someone believes the higher rank person's answer is correct but it's not.
Answer
Answers (1)
Computers and Technology
UnknownAssassin
16
What is a recent technological breakthrough with an impact that can be compared to the invention ...
Answer
Answers (1)
Computers and Technology
Helga248
18
which of the following is not a type of user account? A. Administrator b. Guest c. Group d. Standard
Answer
Answers (1)
Computers and Technology
KenzieFaas
15
Which part of a window lets you see a fileâs contents without opening the file?
Answer
Answers (1)
Computers and Technology
SybleHazarika
17
A __________ is any hypothetical person using a program and providing input for it.
Answer
Answers (1)
Computers and Technology
neardyboy4699
13
There's no sound on my phone and the volume button is all the way up...... the freak do I do??
Answer
Answers (2)
Computers and Technology
Christopher
17
Who proved that a machine capable of processing a stream of 1s and 0s was capable of solving any ...
Answer
Answers (1)
Computers and Technology
navy
18
if he listened to music while he waited is it passive, limited, engaged
Answer
Answers (2)
Computers and Technology
atimeka1
14
What is the main function of the CPU
Answer
Answers (1)
Computers and Technology
socially
17
The purpose of the _____ is to store the boot process instructions for the computer to start up
Answer
Answers (1)
Computers and Technology
robin
17
The standard tcp/ip protocol uses ip addresses which are how many bytes in length
Answer
Answers (1)
Computers and Technology
Angeles843
20
The term for recovering from computer-related attacks, incidents, and compromises is:
Answer
Answers (1)
Computers and Technology
sandiesalazar
13
In pseudocode you can use the ________ library function to determine whether a character is white...
Answer
Answers (1)
Computers and Technology
ElanorNocks
9
Which software protect your computer from harmful files Trojan horses and worms
Answer
Answers (1)
Computers and Technology
Jaay789
14
A hard drive that is running slowly may not have been properly?
Answer
Answers (1)
Computers and Technology
ladayshianae
12
this site isnt a good one, save time and dont spend your money on this stuff?
Answer
Answers (1)
Computers and Technology
AmieKlohr
11
how is a cell named?
Answer
Answers (1)
Computers and Technology
Jaderich
13
the file manager used in microsoft windows is
Answer
Answers (1)
Computers and Technology
RobtKitamura335
10
What best describes the dropping height of a ball that bounced back up to a height of 45 centimet...
Answer
Answers (1)
Computers and Technology
zoeneug
11
The ________ of a cpu dictates how many instructions the cpu can process each second.
Answer
Answers (1)
Computers and Technology
mylindahowell
11
You discover memory is corrupted, what would be an indication of a software vs. a hardware issue?
Answer
Answers (1)