1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cestrela7 [59]
3 years ago
5

Here it is crews my profile pic

Computers and Technology
2 answers:
Murrr4er [49]3 years ago
7 0
It looks niceee
Also can you mark me brainlyest for extra points
Westkost [7]3 years ago
4 0

Answer:

same i rrly wanna rank up, but i NEED brainlist

Explanation:

You might be interested in
Microsoft word's spelling checker will offer suggestions on misspelled words.<br> True)<br> False)
Rasek [7]
This is true. I hope I was helpful!
7 0
4 years ago
Read 2 more answers
What is 1 of the rules for naming variables?
vova2212 [387]

Answer:

<h3>Rules for Naming Variables</h3><h3>The first character must be a letter or an underscore (_). You can't use a number as the first character. The rest of the variable name can include any letter, any number, or the underscore. You can't use any other characters, including spaces, symbols, and punctuation marks.</h3>

<em><u>#</u></em><em><u>M</u></em><em><u>a</u></em><em><u>r</u></em><em><u>k</u></em><em><u>a</u></em><em><u>s</u></em><em><u>b</u></em><em><u>r</u></em><em><u>a</u></em><em><u>i</u></em><em><u>n</u></em><em><u>l</u></em><em><u>e</u></em><em><u>s</u></em><em><u>s</u></em><em><u>p</u></em><em><u>l</u></em><em><u>e</u></em><em><u>a</u></em><em><u>s</u></em><em><u>e</u></em><em><u>✅</u></em>

3 0
3 years ago
Felicia is a computer programmer.
dolphi86 [110]

A: SSD, HDD, CPU or RAM

Whether you go with the faster SSD or slower but larger HDD, keep in mind you may end up needing a drive large enough to run a dual boot system if you plan on coding in multiple environments. Virtualization of other operating systems is another option, but that requires a fast CPU and a large amount of RAM to work well.

B: Ram because its larger than the others, and will work better.

C: i don't really have a suggested system but here

You may appreciate the seamless experience iOS offers, the flexibility of Android or the familiarity of Windows with your everyday PC. It might take some time to acclimate to a new system, so it may be best to stick with what you know.

Please consider marking brainliest.. thx

8 0
3 years ago
Eve has tricked Alice into decrypting a bunch of ciphertexts that Alice encrypted last month but forgot about. What type of atta
NISA [10]

Answer:

Eve is employing a <u>chosen-ciphertext attack.</u>

Explanation:

Encryption is a strategy employed in the cyber world to allow sensitive and private data to be unreadable in the form of text or make the content of the data inaccessible by intruders. This is imperative to guard data and can only be accessed with the use of a key (password). Whoever has the authorized key could get access to the data thereby making the encrypted data readable in the process called Decryption.

The Ciphertext is a term used to explain data encrypted in the form of text.

When Eve tricked Alice into decrypting a bunch of ciphertexts, she was interested in having the general public key or private key depending on what she wants to get access to which makes it a chosen-ciphertext attack. Usually, these keys are in algorithm formats with long characters. When the chosen-ciphertext is analyzed by Eve, then she could guess the user secret key.

3 0
3 years ago
Which scientific tool would be primarily used by scientists?
kkurt [141]
My answer is D. All the above :)
8 0
3 years ago
Read 2 more answers
Other questions:
  • Problem 2 (40 points)-Write a program. Submit a file named weight.cpp Create a program that continuously allows a user to enter
    5·1 answer
  • What is the local portion of the e-mail address below? <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="
    14·1 answer
  • Prompt the user to input an integer, a double, a character, and a string, storing each into separate variables. Then, output tho
    9·1 answer
  • Which of the following is a quick way to restore the arrow pointer after you have used it for drawing?
    5·1 answer
  • Imagine that you have a friend who has expressed interest in designing and programming video games. He loves to play video games
    10·1 answer
  • What malware looks like a useful or desired executable program but is, in reality, a program that is supposed to cause harm to y
    11·1 answer
  • List any two different between primary memory and secondary memory.​
    8·2 answers
  • What free website can you record videos on, and edit them without money?
    5·2 answers
  • Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes su
    7·1 answer
  • you want to upgrade your windows 10 professional computer to windows 11 professional. you begin by checking the hardware and dis
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!