1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gregori [183]
3 years ago
9

What does <3 mean at the end of a message?

Computers and Technology
1 answer:
adelina 88 [10]3 years ago
8 0
It is supposed to symbolize a heart, signifying love.
You might be interested in
Create a new Die object. (Refer to Die.html for documentation.)Create a loop that will iterate at least 100 times. In the loop b
hjlf

Answer:

Java code is given below

Explanation:

import java.util.Random;

class Die{

private int sides;

public Die(){

sides = 6;

}

public Die(int s){

sides = s;

}

public int Roll(){

Random r = new Random();

return r.nextInt(6)+1;

}

}

class DieRoll{

public static void main(String[] args) {

Die die = new Die();

int arr[] = new int[6];

for(int i=0; i<6; i++)

arr[i] = 0;

for(int i=0; i<100; i++){

int r = die.Roll();

arr[r-1]++;

}

for(int i=0; i<6; i++)

System.out.println((i+1)+" was rolled "+arr[i]+" times.");

}

}

8 0
3 years ago
Microsoft word's spell checker?
vekshin1
The answer to the given picture is - Microsoft word's spell checker only recognizes very common words. Microsoft word has it's own dictionary which will be compared to the texts on your document. If they see an unfamiliar word they will underline it with red. Anyways you can add your own words and names to the custom dictionary.
8 0
3 years ago
Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that
kakasveta [241]

Answer:

The answer of the following question is Brute force attack .

Explanation:

A brute force attack is the error and trial method that is used by an application program to decode the encrypted data like passwords or the Data Encryption Standard (DES) keys, which through an exhaustive effort (by using brute force) rather than the employing an intellectual strategies.

7 0
2 years ago
An IT systems engineer creates a new Domain Name System (DNS) zone that contains pointer (PTR) resource records. Which zone type
faust18 [17]

Answer:

SOA

Explanation:

Statement of Authority, or you could also say that the zone that has been created is a reverse lookup

4 0
3 years ago
Explain why regular system cleanup is vital to ensuring the operating system runs efficiently.
Monica [59]
Cleaning up a system helps clear up the space on the drives. It may also clear up processor usage, ram usage if you uninstall programs that automatically started when the system booted. You may also delete some unwanted programs in the process.
6 0
3 years ago
Other questions:
  • When a crystal grows in unrestricted space, how does growth occur?
    14·2 answers
  • Refer to the exhibit. A web designer calls to report that the web server web-s1.cisco is not reachable through a web browser. Th
    15·1 answer
  • Multiple Choice
    6·1 answer
  • What is a digital certificate? Select one: a. It is a means of establishing the validity of an offer from a person, entity, web
    7·1 answer
  • Which option ensures that a page break is automatically inserted ahead of a specific paragraph or heading?
    10·2 answers
  • What’s an example of software?
    6·2 answers
  • Write bash script which takes array as an input of size 10 bind its even indexes to accept even values and odd indexes to accept
    5·1 answer
  • What is a simulation?
    5·2 answers
  • Search the Web for three different employee hiring and termination policies. Review each and look carefully for inconsistencies.
    5·1 answer
  • Put these operating systems in order according to the date they were released. (The first to be released would be
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!