only cool people answer this question.




are you cool?

Answers

Answer 1

Answer:

Yes

Explanation:

I like frogs

Answer 2

Answer:

always been coolswag


Related Questions

The ethernet cable is also known as? *
Cat 5 cable
Wan cable
RD-45 cable
Sat 5 cable​

Answers

Answer:

Cat 5 cable

Explanation:

The ethernet cable is also known as Cat 5 cable.

Cual es de las siguientes pertenece al software de una computadora
A bocina
B teclado
C messenger
D monitor

Answers

Explanation:

a sjsjsjsijdjdnjjjjururueu

Which of the following numeric values is considered a floating point?
A. 16
B. -16
C. 1.6
D. 160

Answers

Explanation:

B.-16

Because the things is that idk

1 of 10
The biggest difference between scholarships and loans is that
scholarships are considered _____ but loans must be paid back.
easy money
liquid assets
free money
sound investments

Answers

Answer:

free money

Explanation:

scholarship money you can keep and do what you please with it. its not really easy money since its actually difficult to get scholarships, and the other ones dont make sense because how do you invest in a scholarship? theyre not liquid assets either

Easy Question I will make you brainless Just answer this 10 question!!.​

Answers

Answer:

Utility knife - basket

Old newspaper - basket

Strong scissor-Sc

Clean soda can-Sc

Stapler - B

Scissor-basket

Push pin - Sc

Masking tape - Sc

Pin black-Sc

Glue-basket

Hey is anyone else getting this? Don't mind the answer.

Answers

Answer:

Getting what? I don't get what you mean.

Maybe the dog is in heaven…therefore it’s infinity miles while the other has a certain number of miles because it is alive and on the earth..??


Not 100% sure but I think that’s why.

n (m,n) correlating branch predictor uses the behavior of the most recent m executed branches to choose from 2m predictors, each of which is an n- bit predictor. A two-level local predictor works in a similar fashion, but only keeps track of the past behavior of each individual branch to predict future behavior.There is a design trade-off involved with such predictors: correlating predictors require little memory for history, which allows them to maintain 2-bit predictors for a large number of individual branches (reducing the probability of branch instructions reusing the same predictor), while local predictors require substan- tially more memory to keep history and are thus limited to tracking a relatively small number of branch instructions. For this exercise, consider a (1,2) correlating predictor that can track four branches (requiring 16 bits) versus a (1,2) local pre- dictor that can track two branches using the same amount of memory. For the fol- lowing branch outcomes, provide each prediction, the table entry used to make the prediction, any updates to the table as a result of the prediction, and the final mis- prediction rate of each predictor. Assume that all branches up to this point have been taken. Initialize each predictor to the following:

Answers

Answer:

a

Explanation:

describe accessibility in Windows 7 ​

Answers

Answer:

Accessibility is the epitome of usability and was a key tenet throughout the engineering of Windows 7. ... Windows 7 includes accessibility options and programs that make it easier to see, hear, and use your computer including ways to personalize your computers and use keyboard shortcuts.


What is the best most effective way to add your savings account?

Answers

Explanation:

to put money in your savings account for college and Car a house and a.bunch of important stuff in life

Order the steps to describe how to access the Electronics Business Card dialog box.

Answers

Answer:

posting it fren.  your order is correct

Explanation:

The Electronics Business Card dialog box is a feature in Microsoft Outlook that allows you to create and manage virtual business cards. Here are the steps to access the Electronics Business Card dialog box:

How to access the Electronics Business Card dialog box ?

Open Microsoft Outlook on your computer.

Click on the "File" tab located in the top left-hand corner of the screen.

From the drop-down menu, select "Options".

In the Options window, select "Contacts" from the left-hand menu.

Scroll down to the "Create contacts" section and click on "Electronic Business Cards".

In the Electronic Business Card Editor, you can create and manage your virtual business card by adding or editing the fields as needed.

Once you have completed making changes, click on "Save & Close" to save your electronic business card.

By following these steps, you can easily access the Electronic Business Card dialog box and create or manage your virtual business card in Microsoft Outlook.

Learn  more about Electronics Business Card here

https//brainly.com/question/19446197

#SPJ3

what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Answers

Answer:

Image result for what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Common applications of X. 509 certificates include SSL/TLS and HTTPS for authenticated and encrypted web browsing, signed and encrypted email via the S/MIME protocol, code signing, document signing, client authentication, and government-issued electronic ID.

Explanation:

1. Define the term M.A.N.

Answers

He is right I got it correct Thanks:)

Individuals may restructure their investment portfolios because

Answers

Answer:

the results are below expectations

what guidance identifies federal information security controls?

Answers

Answer:

FIPS Publication 200, the second of the mandatory security standards, specifies minimum security requirements for information and information systems supporting the executive agencies of the federal government and a risk-based process for selecting the security controls necessary to satisfy the minimum security..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

The guidance identifies federal information security controls is THE PRIVACY ACT OF 1974.

What is Personally Identifiable statistics?

Personally Identifiable statistics (PII) is any statistics approximately a person maintained with the aid of using an organization, inclusive of statistics that may be used to differentiate or hint a person's identification like name, social safety number, date and region of birth, mother's maiden name, or biometric records.

The Privacy Act states the guidelines that a federal enterprise need to observe to collect, use, transfer, and expose a person's PII.

Read more about the security :

https://brainly.com/question/26260220

#SPJ2

8
Select the correct answer from each drop-down menu.
The AND operator narrows
your search results. The OR operator broadens your search resul
Result. Am I right?

Answers

Answer:

yes you are correct

the AND operator narrows

the OR operator broadens your search results

Answer:

yes your right

(:

Explanation:

what is an indication that malicious code is running?

Answers

Answer:

If you are running Windows check task manager and see if any background process if running if there is a background process of command prompt or powershell, there is a chance that there is a backdoor running in your system, you can just right click and end the task it should just kick the hacker off the server.

please give brainliest

Order the steps to describe how to attach a contact to a new email

Answers

Answer:

confirm image correct

Explanation:

The water splashed all over the top of the car.

Answers

Answer:

e

Explanation:

Dry the car of i guess

Is 1/5 a rational number, interger, whole number, and natural

Answers

Answer:

1/5 is a rational number.

Explanation:

Natural numbers are the numbers you use to count with (1, 2, 3, etc.). Nobody uses fractions while counting whole objects unless they think they're funny and want to stall, so 1/5 wouldn't be a rational number.

Whole numbers are the exact same as natural numbers, but with the addition of the number 0 (think about it, no one starts from zero when counting).

Integers include whole numbers as well as their opposites (for example, the opposite of 4 is –4).

As a basic rule of thumb, if the number includes a fraction or a decimal point of any kind, it would be a rational number.

please help

in two to three sentences describe how you would divide a page into two columns.​

Answers

Follow the steps outlined:-

Highlight the text you wish to split into columns.

Select the “Page Layout” tab.

Choose “Columns” then select the type of columns you wish to apply. One. Two. Three. Left. Right.

This type of cable is used to connect the keyboard and mouse to the computer:

PS/2 cable
Ethernet cable
HDMI cable
DVI cable​

Answers

Answer:

I'm going to have to go with PS/2 cable

Explanation:

did some research

it's the ps/2 cable

ethernet cables are for wifi

hdmi connects computer to the monitor

dvi connects to an older type of monitor

Which of the following behaviors does not harm a company if your employment is terminated?

getting a copy of word-processing software before leaving

selling trade secrets to competing companies or to your future employer

creating a username and password so you can access company information after you have left

notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave

Answers

Answer:

Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.

Explanation:

Trying to grab a copy of your work software can harm the company by potentially creating a security risk. There can still be residual files left by the company left in the software, and any virus or hackers that access your computer can find those files or connect to the company's cloud network.

Selling trade secrets will not only be bad for the company once your employment is terminated, but can actually lead to job termination itself because with those secrets out, competing companies can make identical products of the same (or better) quality for less money, which could result in a loss of profits or even going out of business. This is why non-disclosure agreements exist.

If you can still access company information even after you leave, this poses a security threat to the company because you can then sell that information to other companies or leak it online for everyone to see. Even if you don't do it yourself, a virus or hacker lurking on your computer would be more than happy to do it for you. That information could also be personal payment or identifying information of employees and clients/customers, which could cause people to lose trust in the company.

The best thing to do to avoid facing these consequences and protect other people's information is to turn over your accounts and any information you have of the company and allow them to revoke your access to that information. This not only helps the company remain secure and profitable, but you also won't have to possibly deal with law enforcement and have fewer job opportunities as a result.

Answer:

D. Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.

Explanation:

why do cyber attackers commonly use social engineering attacks?

Answers

Answer:

Sometimes the computer's brain is too secure, so of that's the case you should just try to hack the human brain by tricking it to give you the password to an account, or whatever you are using it for.

Hope this help please give the brainliest award.

Answer:

Attackers can gain what they want while bypassing most technical security controls

Explanation:

.

when backing up an ios device to a cloud service the first recommended step is to

Answers

Answer:

make sure that your device is connected to wifi

Explanation:

I think that's the answer because cloud service needs wifi (duh). Hope this helps!

Answer:

The first recommended step is to connect to an internet connect, and not your mobile WiFi as it can take a lot of GB.

Which THREE of the following practices conform to good email etiquette?

using a large font
including a salutation
using a page background
including a closing
using correct spelling and punctuation

Answers

Answer:

including a salutation, including a closing, and using correct spelling and punctuation.

Explanation:

A salutation is a greeting. It is always good etiquette to greet someone.

You do not want to end your email abruptly. Use a good closing.

It is never fun to read an email with bad spelling or punctuation. Using correct spelling and punctuation will make your email look more professional.

Using correct spelling and punctuation, include a closing, and including a salutation

What is LinkedIn?

A job search website
A virtual job fair
A recruiter website

Answers

Answer:

A job search website.

Explanation:

HELP HELP HELP HELP HELP HELP PLEASE GUYS​

Answers

Answer:

word

Explanation:

what safety do you need to have ready to start a device repair?

Answers

Answer:

Make sure to have the right tools for the right job. if you don't it would be probably best to send it to a shop to get fixed.

are special characters usually found on the keyboard?

Answers

Answer:

No

Explanation:

When typing in predefined characters, Automatic substitution feature will change the characters into a symbol or special character. No.

what is the general term for programs used to operate a computer

Answers

Answer:

Software

Explanation:

ez

Answer: A Software System

Other Questions
Which direct quote from Of mice and Men shows that Lennie killing Curley's wife is second degree murder? Write anylasis What is the answer to y=3/4x-5 in standard form? When working with a shared worksheet, how do you know it's shared?The word "Shared is saved in the name of the file.The email in which you received the file says "Shared."The word "Shared" appears after the workbook title in the title bar.The word "Shared" appears at the bottom next to the worksheet tabs. Ivan earns $8 each time he walks the neighbor's dog. He already walked the dog 5 times. How many more times does he need to walk the dog to earn enough money to buy a game that cost $88? I need this this done now!!! Please help me !!!!!!! What are 5 important facts about the national socialist German workers party? look at the image and answer please . will mark brainlistWhat was the purpose of the Proclamation of 1763?to force colonists to trade with Britainto stop American colonists from settling in the Midwestto close the harbor in Bostonto force colonists to pay for protection from British soldiers what happens to the monomer during the synthesis of a polymer? Why is everything so fast give two examples of the thermal energy of a substance being decreased Read lines 109118. What theme can be inferred from this characterization ofBeowulf? Somebody help me please 3.1 Two waves A and B have frequencies 256 Hz and 1024 Hz respectively have amplitude in ratio 3:1 1.What is their ratio of frequencies? Which wave represents a higher pitch2.which sound is louder How will people get justice by doing a protest en los ngeles hay comida de pases latinoamericanos y de espaa. Dylan saves 7% of his $1450.00 bi-weekly net pay. Determine how many periods it will take for Dylan to have $5800.00 saved. What does the US flag flying above Hawaii represent? What is the adverb and what's the adjectiveBob decided fish liked eating worms more than flies HELPPP PWEEESEE IM LEGIT SOOOOO CONFUSEDDDD PLEASE HELPPPP!!!! Ugh