1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lyrx [107]
2 years ago
14

What do you believe the year 2058 will be like? Reply with a link or a picture along with an explanation why. There should be a

minimum of 3 links or pictures.
HELPPPPPPPPPPPP MEEEEEEEEEEEE
Computers and Technology
1 answer:
NeTakaya2 years ago
3 0

Answer:

Explanation:

We will have our sweet mullets back and look like nigel thornberry, and our kids will look like little potato's

You might be interested in
Pleaseee helpppppppppp
zloy xaker [14]

Answer:

EXAMPLE -

Create a variable and assign your age

var myage = 32;

type your age:

console.log(my age) ;

Notice that we did not type the actual numeric age. We used the variable instead. There wouldn’t be any purpose of declaring a variable if we were going to type 32 directly.

This makes the scrip more portable which means that the result on the screen is independent of the code console.log(myAge); . If we need to change our age all we have to do is to assign another number to the variable myAge and the output will change automatically. That’s the purpose of a variable.

5 0
3 years ago
Which of the following might be a job or task of an IT worker who manages networks?
Vladimir79 [104]
We need the options to be able to help.
7 0
4 years ago
Read 2 more answers
Under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy. A given bank has just implemented its online banki
d1i1m1o1n [39]

Answer:

System/Application Domain and LAN-to-WAN Domain.

Explanation:

The Gramm-Leach-Bliley-Act is also referred to as the Financial Services Modernization Act of 1999. It was enacted by the 106th Congress of the United States of America and it requires that financial institutions explain to their customers the information sharing policies and ensure that customer sensitive data (privacy) is safeguarded.

This, under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy.

In this scenario, a given bank has just implemented its online banking solution that allows customers to access their accounts and perform transactions via their computers or personal digital assistant (PDA) devices.

Hence, online banking servers and their public Internet hosting would fall within the System/Application Domain and LAN-to-WAN Domain.

In an IT infrastructure, there are seven main domains and these are the: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application.

3 0
3 years ago
(true or false) fortnite is the best?
GarryVolchara [31]

Answer:

FALSE ZzZzZzZz

Explanation:

Cus it is PERIOT

7 0
3 years ago
Read 2 more answers
What modifier should you use on a class so that a class in the same package can access it but a class (including a subclass) in
7nadin3 [17]

Answer:

Option (B) is the correct answer of this question.

Explanation:

In the Private access modifier we can access the property and field within the package or class we cannot accessing the member outside the class .

  • We use private keyword for declaring the private access modifier.
  • In the public access modifier we accessing the property outside the class so it's a incorrect option .
  • In the protected access modifier we access the property of class package and subpackage both so it's a incorrect option.
  • The default modifier is incorrect it not follow the given scenario so it's incorrect.
4 0
4 years ago
Other questions:
  • Alice has to move around a lot to fetch objects at her workstation. Which ergonomic principle should Alice follow to prevent str
    8·2 answers
  • What did you include in your response? Check all that
    15·1 answer
  • What is the mass of the light bulb? a. 425.6 g b. 204.6 g c. 240.56 g d. 245.6 g
    6·2 answers
  • Write a code block to encode strings from original messages, using our custom encoding. To do so: Initialize a variable called c
    6·1 answer
  • A data set has 60 observations with minimum value equal to 30 and a maximum value equal to 72. The estimated class width using t
    11·1 answer
  • Titus would like to make his products stand out a little more in his Excel spreadsheet. What actions would help to distinguish o
    15·1 answer
  • Is this right? I’m not sure
    15·1 answer
  • Como se diseña y produce un material audiovisual
    5·1 answer
  • WHERE DO I GO TO DO THIS AND WHAT DO I WRITE?????
    14·2 answers
  • Reflection image and design
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!