1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aalyn [17]
4 years ago
13

Why are good friendships beneficial? They offer you a support system. You have a chance to pretend to be someone else. You becom

e the person you're supposed to be much faster. You will get a boyfriend or girlfriend faster.
Computers and Technology
2 answers:
Shkiper50 [21]4 years ago
6 0
The answer is B) they offer you a support system
Fantom [35]4 years ago
3 0
The answer would be A) <span>They offer you a support system because its true, having a friend is someone who will support you through anything and be loyal to you, you don't get a bf or gf, you don't get to impersonate anyone, and you don't be the person you're suppose to be faster, we all make our own decisions, so there is no thing where you're forced to be this person.</span>
You might be interested in
Question 12 (1 point)
QveST [7]

Answer:

margins

Explanation:

the definition margins are the edges

8 0
3 years ago
What bit position in an ascii code must be complemented to change the ascii letter represented from uppercase to lowercase and v
MariettaO [177]
Flip bit position 5 to accomplish this. This maps to hex value 0x20, where the least significant bit is assumed to be at position 0.

Example: ascii "A" = 0x41, "a" = 0x61.  0x41 xor 0x61 = 0x20.

You would implement a flip function by XOR'ing the character value with 0x20.
4 0
3 years ago
charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes a
finlep [7]

Charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes and repairs security issues found. The kind of scanning that best describes Charles's requirements is: Active scanning.

<h3>Who is a Security Analyst?</h3>

A Security Analyst's responsibilities include the following:

Define, plan, execute, maintain, and improve security measures, policies, and controls. Writing reports and offering insights on the effectiveness of current security policies, incident response plans, disaster recovery plans, and other security-related information

Active scanning is a scanning approach that involves scanning individual endpoints in an IT network in order to retrieve more specific information.

Learn more about Security Analysts:
brainly.com/question/16354463
#SPJ1

6 0
1 year ago
When mysql automatically converts one data type to another, itâs known as a/an ______________________ conversion?
lubasha [3.4K]
<span>MySQL is an open-source relational database management system (RDBMS)</span>
When MySQL automatically converts one data type to another, is known as an implicit conversion. Implicit conversion refers to the mixing and matching data types within the same operation. Example for implicit conversion is when MySQL automatically converts numbers to strings and vice versa. 
5 0
4 years ago
Please help...........​
MrMuchimi

Answer:

Explanation:

As a user of GPL v3 software, you have lots of freedom: You can use GPL software for commercial purposes. You can modify the software and create derivative work. You can distribute the software and any derivative work you produce, without having to ask for permission or pay

4 0
3 years ago
Read 2 more answers
Other questions:
  • Why does the job market change overtime
    9·1 answer
  • Consider the following C++ program in which the statements are in the incorrect order. Rearrange the statements so that itprompt
    6·1 answer
  • When was internet started in which year​
    13·2 answers
  • Muultimedia Promo try answer this question and explaining them or give examples of that topic Thanks
    10·1 answer
  • BUURTAIS
    7·1 answer
  • 1. Pasar los siguientes ejercicios a diagrama de bloque
    11·1 answer
  • Let x = ["Red", 2.55,"Green", 3,"Black","false"], then solve the following:
    7·1 answer
  • Which protocol is well known for its use in the the home security and home automation industry, uses a mesh topology, makes devi
    7·1 answer
  • These brainly bots need to stop!!
    14·1 answer
  • At a family reunion, your cousin takes a picture of both of you with her phone, orders a print of it, and mails it to you with a
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!