Answers on questions: Computers and Technology

Computers and Technology
maureen07
211
GIMP's official website is _____
Answer
Answers (1)
Computers and Technology
JonaBerey
99
Need help with b and c
Answer
Answers (1)
Computers and Technology
aaa159951twtw
96
How are 3D microscopes and regular cameras the same
Answer
Answers (2)
Computers and Technology
drvmms
100
PLEASE HELP!! HELP ME
Answer
Answers (1)
Computers and Technology
veronicazeledon
99
When someone believes the higher rank person's answer is correct but it's not.
Answer
Answers (1)
Computers and Technology
UnknownAssassin
96
What is a recent technological breakthrough with an impact that can be compared to the invention ...
Answer
Answers (1)
Computers and Technology
Helga248
104
which of the following is not a type of user account? A. Administrator b. Guest c. Group d. Standard
Answer
Answers (1)
Computers and Technology
KenzieFaas
100
Which part of a window lets you see a fileâs contents without opening the file?
Answer
Answers (1)
Computers and Technology
SybleHazarika
102
A __________ is any hypothetical person using a program and providing input for it.
Answer
Answers (1)
Computers and Technology
neardyboy4699
92
There's no sound on my phone and the volume button is all the way up...... the freak do I do??
Answer
Answers (2)
Computers and Technology
Christopher
97
Who proved that a machine capable of processing a stream of 1s and 0s was capable of solving any ...
Answer
Answers (1)
Computers and Technology
navy
103
if he listened to music while he waited is it passive, limited, engaged
Answer
Answers (2)
Computers and Technology
atimeka1
100
What is the main function of the CPU
Answer
Answers (1)
Computers and Technology
socially
98
The purpose of the _____ is to store the boot process instructions for the computer to start up
Answer
Answers (1)
Computers and Technology
robin
98
The standard tcp/ip protocol uses ip addresses which are how many bytes in length
Answer
Answers (1)
Computers and Technology
Angeles843
102
The term for recovering from computer-related attacks, incidents, and compromises is:
Answer
Answers (1)
Computers and Technology
sandiesalazar
89
In pseudocode you can use the ________ library function to determine whether a character is white...
Answer
Answers (1)
Computers and Technology
ElanorNocks
98
Which software protect your computer from harmful files Trojan horses and worms
Answer
Answers (1)
Computers and Technology
Jaay789
103
A hard drive that is running slowly may not have been properly?
Answer
Answers (1)
Computers and Technology
ladayshianae
92
this site isnt a good one, save time and dont spend your money on this stuff?
Answer
Answers (1)
Computers and Technology
AmieKlohr
100
how is a cell named?
Answer
Answers (1)
Computers and Technology
Jaderich
95
the file manager used in microsoft windows is
Answer
Answers (1)
Computers and Technology
RobtKitamura335
86
What best describes the dropping height of a ball that bounced back up to a height of 45 centimet...
Answer
Answers (1)
Computers and Technology
zoeneug
88
The ________ of a cpu dictates how many instructions the cpu can process each second.
Answer
Answers (1)
Computers and Technology
mylindahowell
92
You discover memory is corrupted, what would be an indication of a software vs. a hardware issue?
Answer
Answers (1)