1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lyrx [107]
2 years ago
14

What do you believe the year 2058 will be like? Reply with a link or a picture along with an explanation why. There should be a

minimum of 3 links or pictures.
HELPPPPPPPPPPPP MEEEEEEEEEEEE
Computers and Technology
1 answer:
NeTakaya2 years ago
3 0

Answer:

Explanation:

We will have our sweet mullets back and look like nigel thornberry, and our kids will look like little potato's

You might be interested in
The MIQ inventory measures how much you value status. What are measures of status?
Alina [70]
When we're taking about measures of status, we're talking about either a socioeconomic perspective or something else. When we're talking about a socioeconomic perspective of status, there are two important measures. One would be social standing of a person and the other would be his economic standing. 
3 0
4 years ago
When a program is adapted to run on multiple processors in a multiprocessor system, the execution time on each processor is comp
____ [38]
I only need points for my questions
4 0
3 years ago
How many bits are used to direct traffic to specific services running on a networked computer?
Mars2501 [29]

Answer:

The correct answer is 16 bit.

Explanation:  

The main role of the transport layer provided the communication channel of the process which are running in a different host. When the information flows there is always traffic that is arisen but the transport layer aimed is that process will go at the correct node and received at the proper destination. The 16-bit number specifies that the process or node is running in the networked traffic.

3 0
4 years ago
If you wish to sign out of your Microsoft account, tap or click ____ on the ribbon to open the Backstage view and then tap or cl
tatuchka [14]

According to you have to http://windows.microsoft.com/en-PH/windows-8/sign-in-out-of-windows you have to click on the account picture on the upper right hand corner to access the backstage view and you have to tap or click the account tab to view the account gallery and sign out from the account. You may also want to check this link as well: https://support.office.com/en-us/article/Sign-out-of-your-Microsoft-account-268b49c8-398f-4057-8a3f-e376789f273a

<span> </span>

3 0
4 years ago
Which of the following is one of the first steps in implementing a comprehensive security program? Setting up a Guest account Cr
yKpoI14uk [10]

Answer:

Setting a strong password policy

Explanation:

In implementing a comprehensive security program, one of the first steps would be to set up a strong password policy.

It is important to understand what the company is trying to protect from third parties.

Setting up a password policy is going to increase the security of the system through the use of strong passwords.

5 0
3 years ago
Other questions:
  • A ____ in Excel is like a notebook.
    8·1 answer
  • Peter recently bought a media player and a digital camera he wants to buy memory card for the devices which memory device should
    10·2 answers
  • The local emergency manager has the responsibility for coordinating emergency management programs and activities. A local emerge
    7·1 answer
  • True or False <br><br> Rootkits are only made by black-hat hackers.
    11·1 answer
  • A personal business letter is a letter that is ____.
    13·1 answer
  • Cabe participates in her employer’s PPO plan. Denzel participates in her employer’s HDHP plan. Neither have any medical expenses
    11·2 answers
  • You are an online training company and stream a lot of training videos from your
    12·1 answer
  • Define E-Mail Write any 4 special features of E-Mail ​
    13·1 answer
  • What would be the printed output of the Python code to the right?
    14·1 answer
  • 9. These particular machines can be decentralized.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!