1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saul85 [17]
3 years ago
6

PLEASE HELP ASAP!! WILL MARK BRAINLIEST!! 20 POINTS!!

Computers and Technology
1 answer:
Sonbull [250]3 years ago
8 0

Answer:

kiss me

Explanation:

you must kiss me

You might be interested in
A band from the 1970s has reunited. They want to revive their careers, but they do not have the funding they once did. An intern
AnnyKZ [126]

A band from the 1970s has reunited. They want to revive their careers, but they do not have the funding they once did. An international tour is not financially possible. The band needs to build renewed interest in their music and make a profit.

Which of the following would be the best decision for this band? \\

-----------------------------------------------------------------------------------------------------

Correct Answer:

<u><em>B) Plan a one-night reunion concert that will be broadcast live, online, and on cable, then sell recordings of the event.</em></u>

<u><em></em></u>

<em>Explanation:</em>

I got the answer correct on EDG2020.

<em />

4 0
3 years ago
Which of the following could be true of two diffrent speicies that have competitieve realtionship in the same ecosytem?
chubhunter [2.5K]

they both an enemy that is the same but they also have a same niche so the have the same niche

6 0
3 years ago
You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workst
vichka [17]

Answer:

Ping

Explanation:

If working in an environment that uses Linux and Windows servers and the network using IP protocol, if an application you are using is unable to to connect to a windows server named FileSrv2, you will need to test network connectivity between your workstation and the server by using either the "ping" or "traceroute" command.

3 0
3 years ago
Create a list of strings based on a list of numbers The rules:_______
Delicious77 [7]

Answer:

listNumbers = [34,56,23,56,78,89,98,45,34,33,25,26,67,78]

listString = [ ]

for i in range(14):

   if listNumbers[i]%2!=0 and listNumbers[i]%5==0:

       listString.append("five odd")

   elif listNumbers[i]%5==0 and listNumbers[i]%2==0:

       listString.append("five even")

   elif listNumbers[i]%2==0:

       listString.append("even")

   elif listNumbers[i]%2!=0:

       listString.append("odd")

print(listNumbers)

print(listString)

Explanation:

In python programming language;

  1. Create two lists
  2. The first is a list of numbers and initialize it with random values: listNumbers = [34,56,23,56,78,89,98,45,34,33,25,26,67,78]
  3. The second list is empty and will hold the string values listString = [ ]
  4. Use a for loop to iterate over all the elementts in the list of numbers
  5. Use the modulo operator (%) to chech for multiples of particular numbers as stipulated by the question
  6. Use combination of if/elif statements for each condition
  7. Use the .append method to add the elements into the list of strings
  8. finially output both lists

See attached code and output

3 0
3 years ago
After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identifie
Aneli [31]

grey hat hackers are those after hacking into ATM systems remotely using a laptop, works with the ATM manufacturers to resolve the identified security vulnerabilities

  • A grey hat hacker is simply known as an hacker that falls between the range of black and white hacker. They are known to illegally break into systems so as to show off their skills to the administrator of the system they penetrated or to seek to sell their services in repairing security breaches.

  • In the ATM case, they attacked it and then also want the ATM manufacturer to use their service.

Conclusively we can therefore say that the hacker was a gray hat hacker.

Learn more from

brainly.com/question/15899195

3 0
3 years ago
Other questions:
  • Technlogies are having a negative impact on business true or false
    7·1 answer
  • What is the purpose of the operating systems processor management function
    7·1 answer
  • Assume that isIsosceles is a boolean variable, and that the variables isoCount,triangleCount, and polygonCount have all been ini
    6·1 answer
  • In what order does the air flow in a canister vacuum cleaner pass through the following components?
    11·1 answer
  • Which of the following examples has four beats in each measure?
    12·2 answers
  • Justify the need for branching and jump codes in the instruction set using real world scenarios
    6·1 answer
  • How do you know where the home row of the keyboard is?
    14·2 answers
  • The index used by the OS to manage computer files is called _____.
    13·2 answers
  • You can find synonyms and disciplinary jargon in the ______, _______, and ______ in your search results. You can then use these
    13·1 answer
  • The Internet was first used by which of the following institutions?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!