1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tekilochka [14]
3 years ago
7

Can you block someone on Brainly?

Computers and Technology
2 answers:
dexar [7]3 years ago
8 0
Yes, you can! If they are bothering you I would recommend you report them first. Check out this Brainly article https://brainly.in/question/1233133 :-)
lbvjy [14]3 years ago
4 0
Yes you can block someone
You might be interested in
Define a public static method named s2f that takes two String arguments, the name of a file and some text. The method creates th
frez [133]

Answer:

Java solution (because only major programming language that has public static methods)

(import java.io.* before hand)

public static boolean s2f(String fileName, String text){

   try{

       PrintWriter out = new PrintWriter(new File(fileName));

       out.println(text);

       out.close();

       return true;

   }

   catch(Exception e){

       return false;

   }

}

6 0
3 years ago
Which of the following is an example of a runtime error?
Rina8888 [55]

Answer:

missing quotation marks around a string literal

6 0
2 years ago
What is the first step in devising security services and mechanisms?
N76 [4]

Solution:

The first step in devising security services and mechanisms is to develop a security policy.

A security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.

This is the required answer.

4 0
3 years ago
Read 2 more answers
Can you help please ill give branilist
konstantin123 [22]

HTML uses tags to help the computer know what different pieces of content in the web page actually are. Right now we've only learned how to tell the computer that some text is a paragraph, or that part of your website is the body. We've already seen how that affects the way our web pages look and are structured.

(I don't know how it should be organized, but hope this helped)

3 0
2 years ago
Explain the first to four generations of a computer​?
goblinko [34]

Answer:

<u>First generation are</u>

a)they are unreliable

b)they are very costly and

c)huge in size

<u>Second generation are</u>

a)they use a transistor

b)smaller in size compared to first generation

c)they are faster than the first generation

<u>Third generation are </u>

a)its more reliable than the first generation and the second generation

b)faster than first generation and the second generation

c)consume less electricity

<u>Fourth generation are</u>

a) they are very cheap

b)they are very small in size

c)they are portable and reliable

Explanation:

explanation is in the answer

3 0
3 years ago
Other questions:
  • How do Hlookup and Vlookup differ?
    5·2 answers
  • Jake was working on an essay for his English class on a stormy Sunday afternoon. Before he could save his document, a big strike
    8·1 answer
  • This function whose primary purpose is to display information to the user can only display one value at a time.
    15·1 answer
  • When entering a expressway using a weave lane you must do what
    7·1 answer
  • Which MUD configuration is the most difficult to maintain
    6·2 answers
  • Mobile devices have their own OSs, tailored to their handheld needs, which means they are not immune to what?
    14·1 answer
  • HELP PLS QUICK TRUE OR FALSE QUESTION
    7·2 answers
  • )
    11·1 answer
  • Most of the internal operations in a computer use hexagonal numbering true or false
    13·1 answer
  • imagine that you are explaining the art of visual comparison to a group of photography students. You are mentoring. What do you
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!