1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skelet666 [1.2K]
3 years ago
15

Was the big blue button thing a good decision or bad? *I think it was a bad idea.

Computers and Technology
2 answers:
Gala2k [10]3 years ago
8 0

sorry i just got banned so delete this answer plz i was banned and i wanted to see if they unbanned me

777dan777 [17]3 years ago
3 0
Yes i feel like it was a pretty good decision and found out a few new things
You might be interested in
Data values in a program are held in _________. a data types b names c variables d lockers
Tpy6a [65]

Answer:

Answered below

Explanation:

Data values in a program are held in variables. Variables are like containers for holding different types of data. A variable can be identified depending on the kind of data it holds. Variables can hold data types of integers, strings, arrays, lists, sets, Boolean etc. They hold unique data types and a can not hold different data types. Different rules exist for naming variables in different programming languages. A variable name should start with lowercase letters and be descriptive of the data it holds.

7 0
3 years ago
Why not to use settimeout in angular.
barxatty [35]

Answer:

start with what you know

Explanation:

you can learn alot

4 0
2 years ago
Describe types of hardware used for output​
sashaice [31]
A computer output device is used to extract information from a computer. There are visual, audio, print and data output devices. Different types of specific hardware include monitors, speakers and headphones, printers and external hard drives.
3 0
3 years ago
Where are the implementation instructions defined in a remote access policy definition?
nataly862011 [7]
The implementation instructions are in the procedure section and yes it describes how to support the two different remote access users and requirements.
8 0
3 years ago
The Circular Flow Model includes serveral actors. Which of the following is NOT listed in the Circular Flow Model?
Ierofanga [76]
I believe it would be Charities

4 0
2 years ago
Other questions:
  • Scenes that are shot outside are known as
    9·1 answer
  • Wireless attacks avoid the access points to limit detection. <br> a. True <br> b. False
    9·1 answer
  • The Software Engineering Code of Ethics and Professional Practice was developed by Select one: a. Computer Professionals for Soc
    7·1 answer
  • Robert's employer has agreed to pay half the tuition for Robert to complete his college degree. This benefit is known as what?
    7·2 answers
  • Which is a form of cyber bullying??
    9·1 answer
  • Money money money money
    8·2 answers
  • Compare and contrast Charles bebbage and Blaise Pascal inventions<br>​
    14·1 answer
  • Is it better to try to prevent damage from natural disasters or to deal with disasters after they occur?
    10·2 answers
  • 2. When a business practices offensive behavior, you have many options. The option with the loudest voice is
    12·1 answer
  • A(n) ____ describes the structure, content, and access controls of a physical data store or database.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!