1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
7nadin3 [17]
3 years ago
12

Quien quiera jugar fortnote en una hora y media o antes pase id

Computers and Technology
1 answer:
miv72 [106K]3 years ago
8 0

Answer:

Samael2008

Explanation:

Samael2008

You might be interested in
You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to
lutik1710 [3]

Answer:

<em><u>D. The UTP cable does not support transmission distances of 75 feet without signal regeneration.</u></em><em> </em>

<em> is the </em><em>most</em><em> </em><em>likely cause of the connectivity problem</em><em>.</em>

Explanation:

hope it will help you

7 0
3 years ago
In this laboratory, we are going to maintain a username-password system by storing the usernames and passwords in a file. The fi
Dominik [7]

Answer:

Explanation:

ok i will do it for ya

5 0
3 years ago
Lol who look at this so funny
seraphim [82]

Answer:

wow my humor is bad then.

6 0
3 years ago
âin order to aid a forensics investigation, a hardware or software ______________ can be utilized to capture keystrokes remotely
faltersainse [42]
(keystroke) logger. I'm hoping this is what you wanted.
5 0
4 years ago
You are going to do a bubble sort on the following list. What are the missing members of the list? Select 3 options.
Nadya [2.5K]
The bubble sort makes multiple passes through a list. It compares adjacent items and exchanges those that are out of order. Each pass through the list places the next largest value in its proper place. In essence, each item “bubbles” up to the location where it belongs.
4 0
3 years ago
Read 2 more answers
Other questions:
  • _________ is the amount of data a storage device can move per second from the storage medium to ram.
    12·1 answer
  • Does group policy management matter without a server environment?
    7·1 answer
  • True false) ther are five arrow keys on the keborad​
    9·1 answer
  • Once a graph has been created, you would need to start over to make any changes to it?
    5·1 answer
  • ____ is the security guarantee that people who intercept messages cannot read them. A. Availability B. Encryption C. Confidentia
    9·1 answer
  • A video game is begun by making selections from each of 3 menus. The first menu (number of players) has 4 selections, the second
    6·1 answer
  • Please answer fast - screenshot included.
    5·1 answer
  • Write a function named repeat_words that takes two string parameters: 1. in_file: the name of an input file that exists before r
    13·1 answer
  • Choose the correct statements about computer-programming languages. Choose all that apply.
    8·2 answers
  • What's this little?<br>​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!