1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
igor_vitrenko [27]
3 years ago
10

I need this ASAP anyone pleas help me i have to do this by tonight

Computers and Technology
1 answer:
tigry1 [53]3 years ago
8 0

Answer:

IDk

Explanation:

You might be interested in
You can customize backdrops in Scratch, adding text or freestyle drawings over the initial image
sveticcg [70]

Answer:

A. True

Explanation:

ive done this myself

https://scratch.mit.edu/projects/395142260/

3 0
3 years ago
WHAT DO YOU KNOW?<br> Why would you want to change your Table<br> Properties?
joja [24]

read the slides ;  Table Properties are the way the table appears or looks.

6 0
3 years ago
Why are security measures protecting gdp data so strict?
Semenov [28]
The stock market would behave very differently if people had easy access to that data.
7 0
3 years ago
Which of the following is TRUE about this statement?
Lynna [10]

E. This statement increments (++) the dereferenced pointer's value (array) by one then "assign" that value.

7 0
3 years ago
___ is a central part of continuous deployment?
nalin [4]
3 deployment pipeline
7 0
3 years ago
Read 2 more answers
Other questions:
  • Simplify (6x+6)+(-3-4x) please hurry!!!!!
    6·1 answer
  • The best way to share criticism is to ______. a. write it in the break room b. talk it about with all your coworkers c. talk abo
    7·2 answers
  • During the Cold War, defense contractors were required to shield sensitive computing systems and prevent electronic eavesdroppin
    14·1 answer
  • Name the three basic storage device of a computer​
    6·2 answers
  • What are registers in ICT used for?
    5·1 answer
  • Web design and development tools
    13·1 answer
  • Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goa
    10·2 answers
  • Barbara, an employee, has properly connected her personal wireless router to a network jack inside her office. The router is una
    7·1 answer
  • write the definition of a class clock. the class has no constructors and one instance variable of type int called hours.
    12·1 answer
  • Which activity is performed during high-level design in the V-model?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!