1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nat2105 [25]
3 years ago
9

Does toontown rewritten carry spyware or malware

Computers and Technology
1 answer:
Oxana [17]3 years ago
4 0
No that is perfectly safe unless something has happened recently.
You might be interested in
Office ____ is the current version of Microsoft Office for Mac operating systems.
gregori [183]

The current version of office is "Office 19" most people use "Office 365" though.

A "Pdf" or "Portable Document Format."

4 0
3 years ago
Question 4 1 pts The following code could be rewritten using: if (x > 12): if (x < 34):​
artcher [175]

Answer:

if(x>12 || x<34)

Explanation:

Mashing the two together using the or '||' operator would allow to run both necessary functions for the next code.

7 0
3 years ago
Please code in python and add comments to code
Gnoma [55]

#accepting input from user

n=int(input("Enter a number: "))

#entered number is stored in a temporary variable

temp=n

#initializng required variables

rev=0

dgt=0

#digits are reversed inside while loop

while(n>0):

dgt=n%10

rev=rev*10+dgt

n=n//10

#original number and its reverse are compared

if(temp==rev):

#if equal, it's a palindrome

print("It is a Palindrome")

else:

#if not equal, it's not a palindrome

print("It is not a Palindrome")

#◌⑅⃝●♡⋆♡Nåmřāthā♡⋆♡●⑅◌

4 0
2 years ago
Koi friend online hai kya​
Arlecino [84]

Answer:

yes

good afternoon friend

8 0
2 years ago
Your organization has hired a penetration tester to validate the security of your environment. The penetration tester needs to d
yulyashka [42]

Answer:

Port scanner

Explanation:

The penetration tester would most likely use a port scanner. A port scanner can be explained to be an application that is made to check a server or host for ports that are open. This application can also be used by administrators to check their security networks so as to know those network services that are running on a host and also to know existing vulnerabilities. Attackers also use this to exploit victims.

5 0
3 years ago
Other questions:
  • Consider the partially-filled array named a. What does the following loop do? (cin is a Scanner object)int[] a = {1, 3, 7, 0, 0,
    6·1 answer
  • Which type of ICS facility is used to temporarily position and account for personnel, supplies, and equipment awaiting assignmen
    15·1 answer
  • Queremos conectar una pila de 4,5 V a un diodo LED cuya tensión de trabajo es de 2 V. Calcula cuál debe ser el valor de la resis
    8·1 answer
  • Which cable standard is a standard for newer digital cable, satellite, and cable modem connections?
    11·1 answer
  • Let G = (V, E) be an undirected graph. Design algorithms for the following (in each
    6·1 answer
  • What are two advantages of a pay-for-use online conferencing service compared to a free service? (Choose two)
    5·1 answer
  • The cafeteria offers a discount card for sale that entitles you, during a certain period, to a free meal whenever you have bough
    13·1 answer
  • Preciso de ajudar para resolver esse exercício, é para amanhã cedo!!<br><br> Em Dev C++
    12·2 answers
  • Disadvantages of a grain crusher
    15·1 answer
  • Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!