1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8090 [49]
3 years ago
7

Can someone pls explain this question??

Computers and Technology
1 answer:
tatuchka [14]3 years ago
6 1

THE ANSWER IS BABABOOEY

You might be interested in
Meats ages hair and feathers all contain this monomer
OverLord2011 [107]

Answer:Amino Acid

Explanation:

All proteins have amino acids

7 0
3 years ago
Which scenario would benefit most from being set up as a recurring appointment?
sveta [45]
The answer is b. Susan has an appointment with he co-worker on the first Monday of every month. This scenario would benefit from being set up as a recurring appointment, since it requires the same thing to be done every month on the same day. Susan is likely to forget this appointment every month, so a reminder like this would be useful for her. For the other cases, a recurring appointment would not be of much benefit since they do not follow a particular pattern time-wise.
3 0
3 years ago
How can I create a pluralsite account for free to sign in​
nevsk [136]

Answer:

I mean I need points but I'm not sure my advice is to look it up or look on y0utube : )

Explanation:

6 0
3 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
What is the best anime of all time?​
Blizzard [7]

(My opinion)  Naruto! (then Boruto is on it's way to becoming good)

but other people might say my hero academia or any of the dragon ball saga

4 0
3 years ago
Other questions:
  • When you see a blank pointer this means you can drag the row or column border to change height or width
    14·1 answer
  • Assume that x is a double variable that has been initialized. Write a statement that prints it out, guaranteed to have a decimal
    5·1 answer
  • You can select slide objects in order to delete them simultaneously by pressing the _____ key as you click each object. select o
    7·2 answers
  • There is no way to track your smartphone once you lost it, true or false?
    15·2 answers
  • Which of the following terms are aspect ratios for devices? 'select all that apply
    11·1 answer
  • Describe any four rights of users of information systems.
    8·1 answer
  • The letters a, e, i, o and u are the only vowels. Write a function named vowelUseDict() takes a string t as a parameter and comp
    7·1 answer
  • 1. In your own words, describe the purpose of a for a loop.
    11·1 answer
  • Join zoom meet <br>id=547 458 9345<br>pw=sencHURI​
    8·2 answers
  • Which part holds the "brains" of the computer?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!