1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ella [17]
3 years ago
6

How does 6ix9ine like it in jail with him rapping about soap slippy uh he finna d1c me uh b00ti3 feeling iffy uh? (<~>) /

Computers and Technology
2 answers:
Sindrei [870]3 years ago
4 0
Um what the heckleberries
inna [77]3 years ago
3 0

Answer: 6ix9ine probs rapping about his delicious frozen jail beans

Explanation: hope this helps lol <3

You might be interested in
In the ____ letter style, all components of the letter begin flush with the left margin.
Sedaia [141]
In the block <span>letter style, all components of the letter begin flush with the left margin.</span>
4 0
3 years ago
Yolanda is making a banner for a school pep rally. She cuts fabric in the shape of a parallelogram. The angle at the bottom left
Irina18 [472]

The answer is 100°

A parallelogram is any four sided shape with two pairs of opposite parallel and equal length sides. It is safe to say that a square is a parallelogram and not the other way round.

To explain how we got to 100 degrees, I have attached an image. Based on the image attached, the opposite angles are equal. The adjacent angles are supplementary. With this in mind, the supplement of 80° will be 100°


5 0
3 years ago
Read 2 more answers
The primary source of help for technical problems with BC Online (computer settings, password, etc.) is:
solmaris [256]

The primary source of help for technical problems with BC Online (computer settings, password, etc.) is: The Instructor

<h3>Computer Technical Problems</h3>

         Usually when we have problems on our computers, depending on the type of problem we can call the attention of a technician or follow the advice of an instructor or the message prompt on the software or website.

        However, when it comes to technical problems such as Computer settings or password, we have to make sure we follow the instructions given by the instructor primarily especially because BC Online from the question is a type of Government Registry Information that is used by the citizens with the aid of instructors.

Read more on computer technical problems at;

brainly.com/question/17506968

3 0
2 years ago
After turning volume all the way up on your computer speaker you still can’t hear any sound. What should be done next
wariber [46]

Answer:

check to see if you have headphones or snything plug in to it that might take the sound if not try restarting your computer, or your speakers are broken with water damage or over use

Explanation:

4 0
3 years ago
Waht is the difference between authorization and access control? Access control specifies what a user can do, and authorization
spayn [35]
<h2>Answer:</h2>

Authorization specifies what a user can do, and access control enforces what a user can do.

<h2>Explanation:</h2>

Authorization is simply granting access to an authenticated user of an application. It specifies what a user can and/or cannot do. For example, for a user to access their banking details in an online banking service, they have to be authorized by first authenticating them to prove their identity. Another example is in an organizational system where some users (normally called admins) can access certain database info whereas some other users (normally called the regular users) cannot.

Access control is used to enforce the policies dictated by authorization. In other words, access control enforces the policy of what a user can and/or cannot do. Access control makes authorization possible. It is sometimes called privileges or permissions. For example, the <em>security tab </em>in the operating system of Windows, allow to set access privileges for certain files and/or folders. Another example is in an organizational system where some files on the organization's server are configured in such a way that access to it is restricted and dependent on some further authorization.

5 0
3 years ago
Read 2 more answers
Other questions:
  • According to the partnership for 21st-century learning critical thinking ability includes all the following skills except
    15·1 answer
  • Someone is retiring next year. What would be an appropriate amount of risk to take their investments?
    8·2 answers
  • If there are no differences between the amino acid sequences in the cytochrome c protein of humans and chimpanzees why aren't we
    15·1 answer
  • Given 3 floating-point numbers. Use a string formatting expression with conversion specifiers to output their average and their
    14·1 answer
  • 20 Points!! Please hurry!!
    9·1 answer
  • Which small-group format would be most appropriate for the following situation? A large sporting event is coming to town. Key me
    14·2 answers
  • Write a Python function called readlinesmton that accepts the name of the file (i.e. filename), starting line number (i.e. m) an
    7·1 answer
  • Please help ASAP!
    7·2 answers
  • BOTH QUESTIONS ONLY FILL IN C++ CODEWrite a copy constructor for CarCounter that assigns origCarCounter.carCount to the construc
    12·1 answer
  • 1. The supervisory software of a computer is called _____ (a) operating system (b) high – level language (c) transistor
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!