1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lubasha [3.4K]
3 years ago
13

Can someone tell me a user to an admin on brainly I got a person sending "inappropriate pictures" all over brainly

Computers and Technology
1 answer:
cupoosta [38]3 years ago
6 0

Answer:

What is the users name

Explanation:

You might be interested in
Which of the following tasks are suitable for creating an algorithm? Choose all that apply.
Nookie1986 [14]

Answer:

All except saving time writing a computer program.

3 0
3 years ago
Explain the importance of understanding plagiarism, copyright, and fair use during a time when some much of your schoolwork is d
kow [346]

Answer:

Firstly, it is unethical because it is a form of theft. By taking the ideas and words of others and pretending they are your own, you are stealing someone else's intellectual property. Secondly, it is unethical because the plagiariser subsequently benefits from this theft.

Explanation:

I hope this helps! Have a good day.

8 0
3 years ago
. Write a code to define a linked list node using the above defined structure student (i.e. the data of the node is a student st
enyata [817]

Answer:

struct node{

   student data;

   node* next;

};

Explanation:

The above written is the segment of code is the structure of node of the linked list.The data of the node is type student.So the data of the node of the linked list will consist of the student details and the next is the pointer which holds the address of the next node.

8 0
4 years ago
output device is any peripheral to provide data and control signal to ab information processing system​
nirvana33 [79]

Answer:

Its false ita not "output" its "input"

7 0
3 years ago
What's your opinion on sentrent (it's a Pokemon)​
Vadim26 [7]

Answer:

Hes really nice

TSUNAMI SUSHI HAS A TSUNAMI OF ADMIN ABUSE!! TSUNAMI SUSHI HAS A TSUNAMI OF ADMIN ABUSE!! TSUNAMI SUSHI HAS A TSUNAMI OF ADMIN ABUSE!! TSUNAMI SUSHI HAS A TSUNAMI OF ADMIN ABUS!Chicken wing

Chicken wing

Hot dog and baloney

Chicken and macaroni

Chillin with my homies

Chicken wings

Chicken wings

4 0
3 years ago
Read 2 more answers
Other questions:
  • What is the size of the key space if all 8 characters are randomly chosen 8-bit ascii characters?
    6·1 answer
  • You need to immediately terminate process id 2129. which command should you use?
    15·1 answer
  • What is a break in the content that forces takes on to the next line
    10·2 answers
  • epic poem - long narrative poem about heroic deeds about pharrell williams of the happy song please help i need the right answer
    11·1 answer
  • The ____ developed numerical methods for generating square roots, multiplication tables, and trigonometric tables used by early
    12·1 answer
  • Write a function, named "wait_die_scheduler" that takes a list of actions, and returns a list of actions according to the follow
    11·1 answer
  • Select three advantages of cloud computing.
    12·1 answer
  • Which terms represent the two types of client requirements?
    7·2 answers
  • In 1981, Ian Murphy broke into the AT&T online computer system and changed their clocks, allowing people to make calls durin
    5·1 answer
  • Write a program that first reads a list of 5 integers from input. Then, read another value from the input, and output all intege
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!