1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Firlakuza [10]
3 years ago
11

For all those among our fans and SpongeBob fans which is better SpongeBob or amount us

Computers and Technology
2 answers:
Ivenika [448]3 years ago
5 0

Answer:

!!!!SPONGEBOB!!! XD

Explanation:

stellarik [79]3 years ago
3 0

Answer:

No spongebob

Explanation:

You might be interested in
You run an automobile selling company that has a popular online store on AWS. The application sits behind an Auto Scaling group
vredina [299]

Answer:

We can achieve this by using cURL command and GET command.

Explanation:

<u>cURL command: </u>

  • cURL command is the command of the command line tools which are available on the following platforms such as Linux, Windows, Mac OS, and many other Operating Systems.
  • From the servers, cURL transfer the following data by using any of the protocol which are supported such as SFTP, HTTPS, HTTP, FTPS or many of the other protocols.

<u> </u>

<u>GET command: </u>

GET command is the function by which from the particular URL we can retrieve the resources.

8 0
3 years ago
In the Word 2016 window, where is the Status bar located?
klasskru [66]

Answer:

I hope this helps

Explanation:

The answer is B

4 0
3 years ago
A​ _______ helps us understand the nature of the distribution of a data set.
Sphinxa [80]

Frequency distribution
3 0
3 years ago
Which type of hacker represents the highest risk to your computer?
Deffense [45]

Answer:

The hacker which represents the highest risk to my computer is the Script Kiddie.

Explanation:

A Script Kiddie cannot make their own programs.

They hack by using existing codes, scripts, web shells etc to access a work station, mutilate webpages etc.

The difference between a Hacker and a Script Kiddie is that a hacker does not need another person's code. They are skilled at writing their own codes which are can be very potent. This level of skill can be difficult to attain except for very bright minds.

The script kid needs very little knowledge of scripts and they are well on their way to causing damage.

Cheers!

4 0
3 years ago
Which technique is used to convert a color image to a black and white image?
Andrew [12]
Microscope
bc thats the answer
4 0
3 years ago
Other questions:
  • A type of memory that is expensive and therefore is often used only in cache memory applications.
    15·2 answers
  • Host A is sending Host B a large le over a TCP connection. Assume Host B has no data to send Host A. Host B will not send acknow
    14·1 answer
  • Which of the following data recording procedures is best used for behaviors that have a clear ending and beginning, do not occur
    12·1 answer
  • Why do bats sleep upside down
    7·1 answer
  • Explain the importance of mobile computing in communication​
    5·1 answer
  • Clicking the ____ opens the insert function dialog box.
    13·1 answer
  • C program To print odd numbers from 15 to 1 ​
    8·1 answer
  • how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks
    10·1 answer
  • Firewalls are available as a special hardware device or as software. A firewall will block packets of information that are from
    7·1 answer
  • Kenny is asked to submit a photo for the annual photographic competition. He decided to capture a photo with the light-painting
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!