1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zielflug [23.3K]
3 years ago
7

um I'm new and I just sign up like right now and brainly says I've reached my daily limit for my questions why?

Computers and Technology
1 answer:
Natalija [7]3 years ago
7 0

Answer:

Im not sure why but maybe you can find a way to contact the people who own it and see if they know because that hasn't happened to me. How many questions have you asked

Explanation:

You might be interested in
Assume you have written a method with the header num yourMethod(string name, num code). The method's type is ____ .
elena-s [515]

A method is written with the header 'num' yourMethod(string name, num code). The method's type is <u>'num'.</u>

In the context of programming. a header refers to supplemental data placed at the beginning of a block of data being transmitted or stored. In the context of the Java method, the header is where you tell the Java program what value type if any, the method will return (a string value, an int value, a double value,  etc). As well as the return type, you require a name for your method, which is also placed in the header. You can pass values over to your methods in between a pair of round brackets.

You can learn more about method in Java at

brainly.com/question/28489761

#SPJ4

8 0
1 year ago
Fill in the blank; "As well as their traditional role of computing data, computers are also extensively used for..."
Vikki [24]

Answer:

Information output and information storage

Explanation:

Output in the form of images, audio, printed on paper, video, 3D models, etc

Storage - saving information internally on hard drive and externally (HDD, SSD, RAID system, etc

6 0
3 years ago
Company that offers Internet access to individuals and businesses. This device connects two or more networks and directs the flo
Ganezh [65]

Answer:

ISP is the correct answer to the following question.

Explanation:

ISP(Internet Service Provider) is the company or an organization which provides the internet connection or access to any persons, individuals or any company. It is the device that connects networks and direct flow of the data or information through the network. If you want to connect through ISP then, you have to connect this device to the computer system.

5 0
3 years ago
Identify an advantage of working in teams.
ra1l [238]

If you're on apex and you have the answer choice

A: Less wasted time

B: Less skills

C: Strong work ethics

D: More ideas

Then D is the answer

7 0
3 years ago
The Gramm-Leach-Bliley Act contains a rule that ensures security and confidentiality of customer information, protects against a
ValentinkaMS [17]

Answer:

b. The Safeguards Rule

Explanation:

According to a different source, these are the options that come with this question:

a. The Information Assurance Rule

b. The Safeguards Rule

c. The Safety Rule

d. The Guardian Rule

This rule is called the <em>Safeguards Rule</em>, and it comes from the Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999. This is an act of Congress signed by President Bill Clinton that removed barriers among banking companies, securities companies and insurance companies. This meant that organizations such as commercial banks, investment banks, securities firms, and insurance companies were able to consolidate.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is not true about search engine advertising?
    15·1 answer
  • Which term describes the order of arrangement of files and folders on a computer
    11·1 answer
  • What movie would be greatly improved if it was made into a musical?
    6·1 answer
  • Write a c++ program to calculate the approximate value of pi using this series. The program takes an input n that determines the
    13·1 answer
  • D. What is the work of the following features:<br>1. Foot note​
    10·1 answer
  • Final one bit l y links are a virus that will corrupt your files do not go on it
    15·2 answers
  • You are between flights at the airport and you want to check your email. Your wireless settings show two options:
    14·1 answer
  • Please please help I don’t understand
    6·1 answer
  • How should excel Identify social security numbers: as a text, numbers, or date and time? Why?
    11·2 answers
  • What wireless security technology contains significant flaws and should never be used?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!