why wont my chromebook stay charging while im using it

Answers

Answer 1

Answer:

Explanation:

Well, it is probly because your chromebook is broken or the carger and/or is it working when you are not using it?


Related Questions

What is a special kind of block that can only give two responses?
A.
forever block
B.
conditional block
C.
loop block
D.
Boolean value

Answers

Answer:

A. forever block

Explanation:

u dont need a explaination

what the answer is have been stuck for 4 hours on this questoin its sience

Answers

Answer:

what the question?

Explanation:

In your opinion., which Zelda character is the hottest? Be honest.

Answers

Answer:

link<3

Explanation:

what are the advantage and disadvantage of super disk,in point???
urgently ​

Answers

Answer:look over this

Explanation:

https://en.wikipedia.org/wiki/SuperDisk

Consider the binary number 1100.a) If you add a zero to the left of the number

(01100) does the value of the binary number change? Explain why or why not

with complete explanations

Answers

Answer:

no

Explanation:

The value represented by the added zero is 0·2⁴, which is of course 0.

In the unlikely situation where the binary number is only 4 bits wide, adding a value would be impossible.

private void finishMap()

{

move();

turnLeft();

move();

move();

move();

takeBall();

takeBall();

turnLeft();

turnLeft();

move();

move();

move();

turnLeft();

}

}

for codeHS 1.5.5 mario karel what am i doing wrong?

Answers

Answer:

Where can I find Codehs answers?

You can view the solution for an assignment in multiple ways: Through the Assignments page.

...

To view solutions from the Assignments page:

Navigate to the Assignments page.

Click the '...' next to the assignment you wish to view the solution for.

Choose Solution and another page will open with the solution reference.

E SEQUENCE OF ACTIONS THAT ALLOWS YOU TO DOUBLE UNDERLINE A PIECE OF TEXT IN YOUR DOCUMENT IS: *

EDIT, INSERT, UNDERLINE, DOUBLE
FORMAT PARAGRAPH, UNDERLINE , DOUBLE
FORMAT, FONT, UNDERLINE STYLE, DOUBLE
FORMAT, FONT, SPACING, UNDERLINE STYLE, DOUBLE

Answers

Hun hbu jh jjjjj iujjjij I

Using robots to replace workers in factories is an example of which of the following forms of information processing systems? a. Commercial b. Control c. Scientific d. Industrial​

Answers

Answer:

Industrial Robots

Explanation:

They are considered industrial robots because the word industrial has to do with an industry or a factory.

Also, industrial robots will replace the human workers

Hope this Helps

To free up human power for more difficult jobs, they are easily used to finish boring, repetitive, and physically taxing chores. This means that many low-skilled positions, like those in warehouses and on assembly lines, will be replaced by robots, endangering the employment of many low-skilled humans. Thus, option D is correct.

What using robots to replace workers in factories?

Labour automation is the process of using technology instead of people to carry out particular tasks or jobs. Mechanization is a component of automation, but it also entails expanding it by using technology to further dehumanize work.

An automated conveyor would transport the product being manufactured from one stationary worker to the next until it was fully assembled, replacing the previous approach in which employees transported their pieces to a stationary assembly site.

Therefore, using robots to replace workers in factories is an example of Industrial forms of information processing systems.

Learn more about robots here:

https://brainly.com/question/15561225

#SPJ2

what 3 types of data can be entered in a spreadsheet

Answers

Answer:

data, labels and formulas

The three types of data that can be entered in a spreadsheet are Number data, Text data and Logical data.

We are given that;

The spreadsheet

Now,

Number data: This includes any kind of numerical values, such as integers, decimals, percentages, dates, times, or phone numbers. Number data can be used in calculations and formatted in different ways.

Text data: This includes any kind of characters, such as letters, words, sentences, or symbols. Text data is used for labels, headings, names, or other information that is not numerical.

Text data cannot be used in calculations, but can be formatted in different ways.

Logical data: This includes only two possible values: TRUE or FALSE. Logical data is usually the result of a test or comparison, such as whether a condition is met or not.

Logical data can be used in formulas and functions that involve logical operators or conditions.

Therefore, by spreadsheet the answer will be Number data, Text data and Logical data.

To learn more about spreadsheet visit;

https://brainly.com/question/31511720

#SPJ6

Help po thank you po ​

Answers

Answer:

hope helpful

Explanation:

a

c

b

c

d

have a great day

what threat do insiders with authorized access to information or information systems pose

Answers

Answer:

Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.

What is a Font? I need help please

Answers

Answer:

This is the answer, see which is best suited

All of the following can provide source data except a. a scanning device at the grocery store b. a utility bill received in the mail c. a bar code reader d. software to process the source data​

Answers

Answer: A: a scanning device at the grocery store

Explanation:

when is not appropriate to be funny in a headline

Answers

Answer: I it is something serious like the death of a person then you should not be funny

you can resize a row in a table by dragging the ____.

Answers

Answer:

desk

Explanation:

You need more backround information i dont know what u talking about

100 POINTSSSSSSS!!
Intellectual property laws were created because _____.

A. people have a right to their own intellectual property

B. people have no value for their own intellectual property

C. people have to get permission to own their intellectual property

D. people have to sacrifice their own intellectual property

Answers

Answer:

D

Explanation:

edg 2021

Answer:

A. people have a right to their own intellectual property

Explanation:

Spreadsheets will be displayed as tables in presentations. True or False?

Answers

True

Explanation:

Tables and spreadsheets can only be inserted into slides with blank layout. Once a table or spreadsheet has been inserted into a slide it's formatting cannot be changed.

Answer: True

Explanation:

write F id the following is formatting tags, H for heading tags, S for structural tags, and SC if it belongs to a seperator/container tags.

1. <div>
2. <h1>
3. <head>
4. <strong>
5. <p>
6. <html>
7. <hr>
8. <center>
9. <h3>
10. <em>​

Answers

Answer:

Here!

Hope this helps. Please mark brainliest!

will economists be replaced by artificial intelligence?

Answers

Possibly, it is a very high chance. I think we use a lot of AI in that field right now. I think their job will change to presenting it.

this endpoint does not support blobstorageevents or softdelete. please disable these account features if you would like to use this endpoint.

Answers

Answer:

A

Explanation:

Endpoint mover is one of the graph tools that has gives the tendency for manipulation of lines or curves. When this manipulation is done, it add some few values to the ploted points so as to achieve a desired line or curve.

What is content filtering ?

Content filtering has been the process of the screening and or restricting access to objectionable email, webpages, executables, and other suspicious items using software or hardware. Filtering software can detect objectionable or criminal content, such as hate sites, illegal content, and social media.

As the part of their internet firewalls, businesses frequently employ content-based filtering, also known as information filtering. Content filtering, a common security measure, assists businesses in enforcing corporate policies regarding the use of information systems, such as the filtering and blocking of employee access to social media platforms.

Therefore, Endpoint mover is one of the graph tools that has gives the tendency for manipulation of lines or curves. When this manipulation is done, it add some few values to the ploted points so as to achieve a desired line or curve.

To learn more about content filtering , visit

https://brainly.com/question/13129235

#SPJ2

please answer it is important!!!! i will mark you branliest

Answers

Answer:

Machine - consists of the numeric codes for the operations that a particular computer can execute directly

Assembly - provides the information of any error in the code.

High level - Require translation.

Require translation.Portable.

Require translation.Portable.Easier to read, write and maintain as commands are similar to English.

Require translation.Portable.Easier to read, write and maintain as commands are similar to English.Allow access to module libraries.

what can be deployed to intercept and log network traffic passing through the network?

Answers

Answer:

Packet sniffers are protocol analyzers that can be deployed to intercept and log network traffic passing through the network.

Explanation:

Which statement correctly describes one aspect of the team's commitment at the end of PI Planning?​

Answers

The statement that describes one aspect of the team's commitment at the end of PI Planning is a team does not commit to uncommitted objectives.

What does teams do in pi planning?

PI planning are known to be a kind of face-to-face events that are held every  8-12 weeks after the former PI event was held.

In this event, a lot of teams do come together to map out, plan and set out the work that they needs to do, review backlogs, discuss which features will benefit them , form or update their product roadmap, and others.

Learn more about PI Planning from

https://brainly.com/question/6500846

I was correcting my keyboard since the arrows had a qwerty swap, but I looked at the settings and realized I needed to change it, but I deleted the keyboard file and my keyboard stopped working, so I panicked. I'd be dead if my father saw the keyboard. What do i need to reinstall it?,,,

Answers

Answer:

Hi,

Try this link

https://certified.windowserrorhelp.com/automatically-update-device-drivers/?headline=%20Keyboard%20Drivers&logo=keyboard&gclid=CjwKCAjw5c6LBhBdEiwAP9ejG1lZr9EYilcRFp3KfYydybYMNfbWAC9-1cwynalo6vDN9R7D452qORoCC9cQAvD_BwE

Then download the thing.I promise it is secure.

Explanation:

It helps reinstall and install driver updates for windows computers. Based on the way you talked about your keyboard it seems like you have a laptop.  The link above will help you re-install and automatically update your keyboard driver. If you have a Mac or other Apple Computer you didn't delete it because Apple hardware has non-removable Drivers for their laptops. in this case there is probably a 3 party source affecting this, such as, heaven forbid, a virus, a corruption of internal storage, or a short circuit.

which cyber protection condition establishes a protection priority focus on critical and essential functions only

Answers

INFOCON 1 is the cyber protection condition establishes a protection priority focus on critical and essential functions only.

INFOCON 1 describes the threat level system (defense system) that is used to defend against military attacks and is based fundamentally on the status of information systems i.e. on essential and critical functions of the system.

There are often five levels of INFOCON with INFOCON 1 being an acronym for "information operations condition 1" and is used in the United States of America and is carried out on attacks that were successful and could impact the missions of the Department of Defence and as such is only needed on occasions of extreme cyber risks.

In addition, INFOCON 1 describes the Computer Network Defense system at maximum alertness and any compromised systems in the network are completely isolated from the rest of the network to avoid further damage.

Learn more about cyber protection here: https://brainly.com/question/25157787?referrer=searchResults

 

list the steps on how to apply bevel and emboss to a layer

Answers

Answer: 2123

Explanation:

ok

Who was your first video game crush? Be 100% honest!

Answers

Answer:

princess peach

wap to sore two different variable a and b resoectively. Calculate sum

Answers

Answer:

Input : x = 10, y = 20;

Output : x = 20, y = 10

Input : x = 200, y = 100

Output : x = 100, y = 200

Explanation:

Pls give ME A BRAINLAIST

Provide 10 points for each question


What is Sophia (Robot) citizenship?

Why is Sophia (robot) a she and not a he

Features - what can Sophia (robots) do and not do, her limits

Public figure – why is she so popular in comparison to other robots

Events - name all events Sophia has spoken in

Controversy over hype in the scientific community – what are they

What is your opinion about Sophia, just a robot or human robot (explain your answer
with merits

Provide a legend of references and link it to each paragraph (cannot use Wikipedia
as a site) – foot note each references, even if it is in your own words

Answers

Answer:

1- Saudi arabia

Explanation:

what to do if you forgot your locked notes password

Answers

Answer:

what you can probably do is go to an Apple store and book an appointment with the Genius Bar and tell them your problem to see if they can help you recover your password.

i hope this helps :D

Other Questions
252- (426) + 18 can someone help me? How to write 9 and 15 thousandths in decimals Find the value of X. When does it have kinetic energy how to speak with foreigner? (they are from english) Fill in the blanks: 1. The peasants and indigenous communities hated the exploitative system of PLEASE HELP!!!Investigate the effect of heat on different foods. Find the independent and dependent variables. which of these is a criterion used to select a target market segment? how do you explain the Renaissance started from Italy ''If you implement this scheme, we shall have no choice but to go on strike.''''_____, we must implement the schemeA: Be that as if may be C: Though it be thusB may that be as it is D: While that be so M if your tires have less than 30% of tread remaining, your stopping distance will be ___ compared to new tires Based on their composition and structure, list CH3COCH3CH3COCH3, CH3CH(CH3)CH3CH3CH(CH3)CH3, and CH3COOHCH3COOH in order of decreasing intermolecular forces. Can anyone help me with this question? PLSSS HELP ME OUTTT!! Which statement best describes a physical change? A. Changes can occur to certain chemical properties of the substance, but the overall shape of the substance will remain the same. B. Changes can occur to certain physical properties of the substance, but the overall shape of the substance will remain the same. C. Changes can occur to physical properties of a substance, but the chemical composition of the substance remains the same. D. Changes can occur to chemical properties of a substance, but the chemical composition of the substance remains the same. Selesaikan persamaan linear serentak berikut.2x + y = -53x - 4y = 9 which equation could be solved using the graph above Champagne was made in France change into interrogative When baking soda and vinegar react bubbles are produced. What mostly occurred?