bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong bing bong

Answers

Answer 1

Answer:

Is this free points? bingbongbingbongbingbongbingbongbingbongbingbong hehe have a nice day :)

Explanation:

Answer 2

Answer:

Thanks for the free points

Explanation:

Giving out free points lol ☺️☺️☺️☺️


Related Questions

Adam has created a document for publishing and needs to ensure that no changes can be made. He has accessed the
Developer tab and is using the Restrict Editing task pane. Which option should Adam choose?

Formatting Restrictions

Editing Restrictions

Start Enforcement

Track Changes

Answers

Answer:

formatting restricions

Explanation:

i took the test

Answer:

B) Editing Restrictions

Explanation:

By enabling this and leaving it as the default setting, the document is now read only and cannot be edited.

List any two features of this computer
h. Who invented Electronic Discrete Variable Automatic Computer? ​

Answers

Answer:

John Mauchy 1. designed to be a stored-program computer 2. it was binary rather than decimal

What is the "middle" value for the "vertical-align" property based on?
a) a line's x-height
b) the height of the age
c) the shortest element on a line
d) the number of elements on a line

Answers

Answer: a) a line's x-height.

Explanation: The middle of the parent element is calculated by taking the x-height, halving it, and adding it to the baseline. Therefore, the "middle" value for the "vertical-align" property must be also based on the line's x-height.

What would a match() property that passed the expression /^[0-9]/ check for?
A.
all strings that do not contain numerals
B.
all strings that contain only numerals
C.
all numeric values
D.
all strings that contain numerals but start with ^
E.
a string that contains only one numeral between 0 and 9

Answers

Answer:

E

Explanation:

I took the test

Answer:

B.  all strings that contain only numerals

Explanation:

which of the following methods of obtaining desert lysed images can recognize and preserve text and formatting
A: a Digital camera
B: an OCR scanneR
C: clip art
D: online graphics

Answers

Answer:

B

Explanation:

what could happen if I break copyright law in the future​

Answers

um i’m pretty sure you could go to jail and you would have to pay fines
youd pay fine. amount depends on the situation. you could also potentially face time in prison

What is best for a busy student to do for better results in school?

increase extracurricular activities
transfer to a new school
manage time and stress
manage and budget money

Answers

Answer:

Manage time and stress

Explanation:

This is obvious

Answer:

manage time and stress

Explanation:

the person above or below me was correct.

to help ensure that an html document renders well in many different web browsers

Answers

Answer:

Doctype Declaration

Explanation:

In order to make sure that it renders correctly in a wide range of browsers, a Doctype Declaration needs to be added to the top of the HTML code. This declaration basically makes sure that the web browser knows how the code was written so that it can correctly read it. This is used because many web browsers use different default settings for reading code and can sometimes not display code that was not designed specifically for that web browser unless otherwise specified.

Answer:

I think it is:

B. a doctype declaration

Explanation:

Is anyone else excited for sephiroth (I think I spelt it wrong) in smash. And if you arn't are you excited for christmas

Answers

Answer: idek what that is but okay ;v;

Answer:

his ultimate is fire

Explanation:

at the transport layer in the internet model, tcp is responsible for breaking large files received from the application layer into smaller messages and opening a connection to a server for transferring them.

Answers

In the internet paradigm, it is true that tcp is in charge of splitting huge files received from the application layer into smaller messages and establishes a connection to a server for their transfer.

A communications protocol known as Transmission Control Protocol, or TCP, permits message transmission between computer hardware and software via a network. It is designed to transmit packets across the internet and to guarantee the successful transmission of data and messages over networks.

With end-to-end communications offered by TCP/IP, it is possible to specify how data should be broken up into packets, transported, routed, and received at the destination. This outlines the process for exchanging data online.

Learn more about tcp:

https://brainly.com/question/24967184

#SPJ4

The complete question is ''At the __________ layer of the 5 layer Internet model, the TCP protocol is responsible for breaking large files received from the application layer into smaller packets and opening a connection to a server for transferring the packets. (use the one word​ name, not number)''.

while viewing the status of interfaces on a cisco switch, you see an abnormally large number of crc errors on one interface. this interface is connected to a user's workstation that is located in a cubicle on the second floor. what could cause this to happen?

Answers

Answer: CRC Can be caused by faulty wires, cat 6 or 7 , or faulty network topography.

Explanation: Switch port could be bad try to switch out the cable to another port on the switch or patch panel . Check the UPSTREAM NETWORK DEVICE Make sure you make or bring enough patch cables to test as some of the wirings may have to be replaced.

True or false binary code is a base ten system

Answers

Answer:

false it is a two base system

Automatic red-eye reduction settings work best on which type of flash?
A.
high-Speed Sync
B.
integrated
C.
external
D.
TTL

Answers

Answer:

c

Explanation:

Which of these features is an orientation feature?
A.
letting users know where they are
B.
letting users know how to get to the next node
C.
letting users know where all the hyperlinks are
D.
letting users know how far they are from a node
E.
letting users know how far from the homepage they are

Answers

Answer:

e

Explanation:

Answer:

letting users know how far from the homepage they are

Explanation:

The physical parts of a computer are called application software.

Answers

Ok so what was the question

Answer:

false

Explanation:

1) which of the following is not a characteristic of valuable information?

A) irrelevant B) Up-to-date

C) Accurate D) Reliable

2) Which of the following is another name for primary storage?

A) CPU B) ROM

C) RAM D) CD drive

3) One of the following is smallest unit of memory?

A) Bit B) Byte

C) kilobyte D) megabyte

Answers

Answer

1. A

2. C

Explanation:

1. Information that is irrelevant is not a characteristic of valuable information.

2. Another name for primary storage is RAM (Random Access Memory).

3. Bit is the smallest unit of memory.

Computers are electronic devices that help process and store information. They also help in making our lives easier with their fast computational ability and process.

Computers have become one of the most important devices in our daily lives. This electronic device is also made up of different parts that all play a huge part in how well the device functions. Random Access Memory or RAM is the primary storage of a computer. And in accessing any information, irrelevant details are not part of valuable information. And in terms of memory, bit is the smallest unit, followed by byte, kilobyte, megabyte, gigabyte, and so on.

Thus, the correct answers are options A), C), and A).

Learn more about computers here:

brainly.com/question/23781325

if you’re using aptana to edit an html file, the easiest way to test it is to group of answer choices click on the run button in aptana’s toolbar type it’s path and filename into your browser’s address bar use the browser’s open or open file command in the file menu find it in the windows explorer and double-click on it

Answers

If you're using Aptana to edit an HTML file, the easiest way to test it is to click on the Run button in Aptana's toolbar.

Making web application development tools for use with various programming languages is the business of Aptana, Inc. Aptana Studio, Aptana Cloud, and Aptana Jaxer are the company's three primary products.

Studio Aptana. An open-source integrated development environment (IDE) for creating web apps is called Aptana Studio. It is based on Eclipse and supports JavaScript, HTML, DOM, and CSS with integrated documentation, code completion, outlining, and JavaScript debugging.

An open-source integrated development environment (IDE) for creating web apps is called Aptana Studio. It is based on Eclipse and supports JavaScript, HTML, DOM, and CSS with integrated documentation, code completion, outlining, and JavaScript debugging.

Aptana Studio now supports Ruby on Rails, PHP, Python, Perl, Adobe AIR, Apple iPhone, and Nokia WRT thanks to additional plugins (Web Runtime).

Learn more about toolbar:

https://brainly.com/question/25047693

#SPJ4

what is a thoughtware​

Answers

Explanation:

plzz write it and plzzzz Mark me brainliest

What are two possible challenges of online collaboration?

Answers

Answer:

A and B

Explanation:

A: In real life, you are always in the same time zone. Working across the internet, however, you are not. (Correct)

B: It's hard for people to understand what you mean, because they can't see body language. (Correct)

C: This could still happen in real life (Incorrect)

D: This is an opinion. (Incorrect)

you need to write a program that has karel put down a tennis ball if the world has dimensions of 1x1. which control structure do you need to use?

Answers

Assuming you need to write a program that has "Karel put down a tennis ball if the world has dimensions of 1x1," the control structure you should use is: C. If Statement.

The types of control structure.

In Computer programming, there are different types of control structure and these include the following:

For LoopWhile LoopIf/Else StatementIf Statement

What is an if statement?

An if statement can be defined as a conditional statement that is written by a computer programmer to handle decisions by running a different set of statements, depending on whether an expression is either true or false.

Read more on if statement here: https://brainly.com/question/18736215

#SPJ1

Complete Question:

You need to write a program that has Karel put down a tennis ball if the world has dimensions of 1x1.

What control structure do you use?

answer choices

For Loop

While Loop

If Statement

If/Else Statement

None of these

C. If statement

May I get brainiest please? :)

Thomas would like to know when is the best time of the season to plant his tomato seeds. Which type of informational reference should he use

Answers

In this question, the options are missing. Here is the complete question:

Thomas would like to know when is the best time of the season to plant his tomato seeds. Which type of informational reference should he use?

A. Encyclopedia

B. Atlas

C. Almanac

D. Any of these

The correct answer is Almanac

Explanation:

Knowing the season or month to plant specific seeds is a relevant factor that can determine whether a plant grows and thrives. Because of this Thomas needs accurate and complete information about the best time of the year to plant tomatoes. This information can be found in an almanac because almanacs include planting dates for different plants as well as weather forecasts and other important events that can affect agriculture. Moreover, this informational reference provides information about the current year, which makes it to be updated in the topics it covers.

Answer:

Almanac

Explanation:

edge 2021

HI IM DORAS SISTER AND IM ASKING IF YOU GUYS COULD HELP ME FIND MY SISTER PLS AND THANK YOU.

Answers

?????????????????????????????????????????

Answer:

BRO SHES IN SWIPERS CRIB

Explanation:

I JUS SAW YOUR GIRLLLL

briefly describe the difference between the working directory, parent directory, home directory, root directory,

Answers

Answer: Home directory is the default working directory when a user logs in. On the other hand, working directory is the user's current directory. Working directory can be changed. It can be changed using cd command.

Please please help...what kind of device is this?​

Answers

Answer:

A hard drive disk for computer storage!

Explanation:

Hope wants to add a third use at the end of her nitrogen list.

What should Hope do first?

What is Hope’s next step?

Answers

Answer:the first answer is put it at the end of 2b

the second answer is press enter

Explanation:

Answer:

1,  put it at the end of 2b     2, press enter key

Explanation:

What is a database management program?​

Answers

Explanation:

A database management program (DBMS) is a software package design designed to manipulate, define, retrieve, and manage data in database.

A DBMS generally manipulates the data itself, the the data format, field names, record structure and file structure.

The quick access toolbar can be customized, but the ribbon can not be customized. True or false?.

Answers

Answer:

False

Explanation:

while developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. the programmer forgets to remove this functionality prior to finalizing the code and shipping the application.

Answers

While developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. the programmer forgets to remove this functionality prior to finalizing the code and shipping the application. This describes the backdoor security weakness.

When developing a network application, it's important to be careful of potential security weaknesses. One such weakness is known as a "backdoor." This is when a programmer includes code that allows them to access the running program without authentication. This can be used to capture debugging data, but it also leaves the program open to potential attacks.

Forgetting to remove this functionality prior to finalizing the code and shipping the application is a serious mistake. If an attacker finds the backdoor, they can exploit it to gain access to the program or data. This can lead to data loss or theft, and in some cases, ransomware attacks.

To avoid these risks, it's important to carefully check your code for any potential backdoors before shipping it. If you do find one, make sure to remove it and secure the program before releasing it to the public.

Learn more on backdoor security weakness here:

https://brainly.com/question/27996068

#SPJ4

What is the next line?
>>> tupleA = (5, 20, 30, 40, 30)
>>> tupleA.index(30)
OO
0 1
03
02
Look at the picture

Answers

Answer:

The answer is "2"

Explanation:

Following are the modified code to this question:

tupleA=(5, 20, 30, 40, 30)#defining a list tupleA that holds multiple integer value  

print(tupleA.index(30))#defining print method that use a index method to print index value

In the above code, a list of integer variable tupleA is declared, that holds numbers, in the next step, tupleA is used with an index method, that holds a number "30", when we print its value it will return an index value that is equal to 3.

Answer:

2

Explanation:

Pradeep and his cousin went to the corner store to buy candy. His cousin paid and told Pradeep he could pay him back. "You owe me 4⁄5 of a dollar," laughed his cousin. "How much is that?" Pradeep asked. "You tell me!" his cousin replied. How much does Pradeep owe his cousin?

Answers

Answer:

"It is 80 cents"

Explanation:

In order to calculate how much this actually is, we would need to multiply this fraction by the value of a whole dollar which is 1. We can divide the fraction 4/5 and turn it into the decimal 0.80 which would make this much easier. Now we simply multiply...

0.80 * 1 = $0.80

Finally, we can see that 4/5 of a dollar would be 0.80 or 80 cents. Therefore Pradeep would answer "It is 80 cents"

Other Questions
When your muscles contract to move your body, such as during walking, work is done, and work requires energy. Based on the law of conservation of energy, from where does this energy come?. Read the excerpt from act 2, scene 1, of The Tragedyof Julius Caesar.BRUTUS. It must be by his death: and for my partI know no personal cause to spurn at himBut for the general. He would be crowned:How that might change his nature, there's thequestion.It is the bright day that brings forth the adder,And that craves wary walking. Crown him that,And then I grant we put a sting in himThat at his will he may do danger with.Th' abuse of greatness is when it disjoinsRemorse from power. And to speak truth of Caesar,I have not known when his affections swayedMore than his reason. But 'tis a common proofThat lowliness is young ambition's ladder,Whereto the climber-upward turns his face;But when he once attains the upmost round.How does the characterization of Caesar in thispassage connect to the central idea of the passage?O By reflecting on Caesar's position in society, Brutusdecides to report the conspiracy to Caesar and joinhim on ambition's ladder.O When Brutus realizes the power that ambitionbrings, he decides to kill Caesar and Cassius inorder to successfully climb the ladder.O Brutus decides to join the conspiracy againstCaesar because he fears that Caesar will becomeruthless once he climbs ambition's ladder and hasabsolute power.O Brutus decides that he must cut the legs off fromthe ladder to prevent Caesar and Cassius fromstepping on anyone along the way. Find the difference: -15 - 47 PLEASE HELP WILL MARK BRAINLIEST Question 8Which pair of equations show below would have infinite solutions?AnswerA Y = -2 + 8y = 4x - 7B y = x - 4y = 3x - 2C) xx 3y = -3x 3y = 6D 3x +y = 36x + 2y = 6 which invention allowed the greatest personal freedom of travel? the horse-drawn trolley the automobile the elevated train Describe the turning points in the Interaction between Kongo and Portugal (two answers or sentences pls) Which of the following is NOT always true of a function and its inverse? please help me! math stuff La seora Hernando est debajo de la mesa.Woman and little girl hiding under a table bLa seora Hernando est debajo de la mesa.Woman sitting on a table cLa seora Hernando es detrs de la mesa.Woman in front of a table dLa seora Hernando es detrs de la mesa.Woman sitting behind a table Hi help me please wit the equation i need help HELP!!!! I NEED IT ASAP!!!! What is the missing reason??? explain how fat can provide both energy and protein to the organnism (7x-1)+(13x-19)=180 solve for x which statement about the event represented in the diagram is valid? PLEASEEE HELP ME FO THISSS Biology enzymes! Help me somebody please. Am I correct? according to the fortune article, many of the zero carbon and clean energy ideas are appropriate for venture funding. econ 125 quizlet math help? please and thank you! Which correctly explains the significance of the Declaration of the Rights of Man (1789)?Question 16 options:It was written in the American colonies to declare an end to British rule and unfair taxation without representation.It was used by French refugees to convince foreign monarchs to help defeat the French Revolution.It outlined the French Revolution ideals that all men deserved liberty, safety, and the right to resist oppression.It was the basis for the written constitution that governed the new United States.