1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maru [420]
3 years ago
6

Is the movie IT really that scary ? Rate between 1-10, 10 being I had nightmares

Computers and Technology
1 answer:
mezya [45]3 years ago
4 0
5 I don’t think it’s good. I thought it was boring.
You might be interested in
If you wanted to divide an integer variable by 2, which of the following lines of code would you use? total = int + 2 total = in
Lesechka [4]

Answer:

Yes

Explanation:

Because all answers are intotal (2)

8 0
3 years ago
. A binary search has a right subtree but no left subtree. What noes contains that least element in the tree
ASHA 777 [7]

The root node will contain the smallest element

7 0
3 years ago
Ports that are generally used to establish outbound connections are known as ___ ports.
aivan3 [116]

Answer:

Ephemeral

Explanation:

3 0
3 years ago
Rita wants to know the size of each image in a folder. Which view will help her find this information quickly?
vaieri [72.5K]
The correct answer would be details.

8 0
3 years ago
______ is the software that blocks a user from being able to access your computer.
antiseptic1488 [7]
The answer is firewall. It is a network security device that observes inbound and outbound network traffic and chooses whether to allow or block specific traffic based on a well-defined set of security rules. Firewalls have been a first line of protection in network security for over 25 years. The firewall present a barrier between measured and secured internal networks that can be trusted and untrusted outside networks, for example the Internet. A firewall can be software, hardware, or even both.
8 0
3 years ago
Other questions:
  • Regulatory control limits the activities of an organization in compliance with the organization's policies. True False
    14·2 answers
  • 23. For the 16-bit binary number 1001 0101 1100 0011, show the effect of: a. A right shift of 4 bits with zero fill. b. A right
    13·2 answers
  • Who was the 1st person to use the term television
    11·1 answer
  • Help with this chart please
    9·1 answer
  • When does information become a liability for an organization
    6·1 answer
  • How to fix a light blub
    11·2 answers
  • Which of the following is NOT a reason to include comments in programs
    10·2 answers
  • Question #5
    15·2 answers
  • In order to personalize your desktop, you may click on: Start>settings>Personalization . . .
    9·1 answer
  • allows users to enter text and control the computer with their voice.allows users to enter text and control the computer with th
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!