1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolezko [41]
2 years ago
5

Why does this happen

Computers and Technology
1 answer:
djverab [1.8K]2 years ago
6 0

Answer:

I dont know, but it might be because of the *pew pew*( I think it's silly that people can get offended over that)

Explanation:

(it literally will not let me say that word)

You might be interested in
Data are made anonymous by Destroying all identifiers connected to the data. Requiring all members of the research team to sign
mestny [16]

Answer:

Destroying all identifiers connected to the data.

Explanation:

Identifiers are your virtual location when navigating, if you destroy your 'Virtual ID', nobody could identify you. Also, you could hide your identifiers, in this case, there's a small risk.

3 0
3 years ago
Which of the following is the output of the code
olya-2409 [2.1K]

Answer:

need to see code

3 0
3 years ago
If an error occurs, each of the numeric functions returns a/an ____________ value.
FrozenT [24]

If an error occurs within a program, each of the numeric functions would return a <u>null value</u>.

<h3>What is a function?</h3>

A function refers to a named portion of a block of executable code that is written to perform a specific task, which is usually a single, related action.

Thus, a function comprises a group of related statements (block of code) that would only run and returns a data when it is called.

In Computer programming, if an error occurs within a program, each of the numeric functions would return a <u>null value</u>.

Read more on a function here: brainly.com/question/19181382

#SPJ12

4 0
2 years ago
You are the network administrator for Corpnet.com. You install the Windows Server Backup Feature on a Windows Server 2012 R2 fil
Vsevolod [243]

To ensure that multiple backups of the server are available for restores you should Modify the frequency of the scheduled backup.

a. Modify the frequency of the scheduled backup.

<u>Explanation:</u>

To backup system normal and good practices schedule every day either different folder, which is further classified day of a week name. For example Sunday, Monday, Tuesday Wednesday, Thursday, Friday Saturday backup schedule will once a week.

Suppose Monday backup schedule run once a week at midnight of every Monday, same away Tuesday backup schedule run once a week at midnight of every Tuesday. If we schedule weekly one day folder end user will have 6 last days folder so that end user can restore the data any point of time.

7 0
3 years ago
The benefits of voice mail include eliminating unnecessary chit chat, telephone tag, inaccurate messages, and a. the need for wr
jonny [76]

Answer:

The correct answer to the following question is option c.) time zone barriers.

Explanation:

When the maximum length of voice mails is set then, the calls that are sent to the voice mail will only recorded up to the that limit. We can also specify the any value from 1 to 60 minutes.

Note: When the voice mails transcription option is enable then, we can specify the any value between from 1 and 2 minutes.

4 0
3 years ago
Other questions:
  • You need to immediately terminate process id 2129. which command should you use?
    15·1 answer
  • What is a Windows feature that allows you to temporarily store text?
    5·1 answer
  • Regulatory and informational markers are easily identified through which features
    12·1 answer
  • What happens it the offshore team members are not able to participate in the iteration demo due to time zone/infrastructure issu
    11·1 answer
  • Which method do software testers use to isolate new code from the rest of the network during the test stage of the software deve
    14·1 answer
  • ________ is used by text recognition software to convert typed, printed, or handwritten text into the computer-based characters
    15·1 answer
  • If you were required to give a speech identifying the risks of using computers and digital devices, which group of items would y
    7·1 answer
  • Domestic refers to things that happen __________ of the united states
    15·2 answers
  • You are now going to prepare some reports for the company. Measurements are in metres and volume
    7·1 answer
  • Match each type of video camera to its features:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!