1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleks04 [339]
3 years ago
9

SOMONE TELL ME THERE ROBLOX USER NAME AND DO U PLAY IT!!!!! MINE IS Borutouzimaki2133

Computers and Technology
2 answers:
Helen [10]3 years ago
8 0

Answer: Yes I play Roblox

Explanation: AestheticAngel21

gizmo_the_mogwai [7]3 years ago
4 0

Answer:

yes i do

Explanation:

king1ev15

also do this one just in case cause i cant check right now king1ev151 and i play alot.

You might be interested in
The scope of a variable declared within a for() loop is:
Leni [432]

Answer:

a

Explanation:

The variable declared in the for is accessible only within the for loop  and it goes out of scope once the loop get end

eg : for(int i=1;i<=10,i++) // variable i is declared

{

// variable i is visible only in this block,

}

//After this the variable i goes out of scope

5 0
4 years ago
. The NFiPA 704 system uses a numerical value between _____ and _____ to indicate the level of hazard for that particular chemic
Taya2010 [7]

the answer is C                                            ................................................                                                                                

5 0
4 years ago
Many web pages today use ____ —small text files that are stored on your hard drive by a web server, typically the one associated
elena-14-01-66 [18.8K]
The data of the webpages on the Internet are commonly stored into hard drives from servers around the world. These supercomputers have the capability to store huge chunks of data just to keep the web page from running. The HTTP protocol is the one that allows for these servers to store data.
3 0
3 years ago
Read 2 more answers
What does "DVI" stand for?
pishuonlain [190]
Digital Video Interface
7 0
3 years ago
Read 2 more answers
________ refers to the ICT architecture, where users access software applications and information systems remotely over the Inte
Slav-nsk [51]

Answer:

Cloud computing

Explanation:

Cloud computing refers to the process of making computer system resources like computing power and data storage available to user on-demand without requiring the user to manage them himself. The computer system resources include servers, applications, networks, services, storage, and others.

It allows data center to be available over the internet to a large number of users.

Cloud computing involves employing a network of remote servers which are hosted on the Internet for processing, storing, and managing data, instead of using a personal computer or a domestic server. Its aim is to ensure a coherence and economies of scaled through resources sharing.

There are two types of cloud computing: enterprise clouds, which its use can be restricted to just one organisation; and public cloud, which is meant for many organisation.

3 0
3 years ago
Other questions:
  • A(n) ____ attack is when a system is compromised and used to attack other systems. a. indirect b. direct c. object d. subject
    13·1 answer
  • What 2 major agricultural inventions did jethro tull create?
    10·2 answers
  • Typically, when an organization purchases Internet access from an Internet Service Provider (ISP), the ISP will grant it
    10·1 answer
  • I’m stuck in a class where i don’t understand anything, it’s only been 3 days.. any tips for learning computer coding?
    12·1 answer
  • What is a CPU or a GPU? What’s the difference? Which one is better?
    5·1 answer
  • Database applications are seldom intended for use by a single user.
    15·1 answer
  • ¡Hola! He visto en muchos comentarios de Twitter "svd" cuando alguien dice "dale fav a este Tweet y siganse entre ustedes" y en
    8·1 answer
  • __________ is a software-enabled technique that can change the hardcoded mac address to any mac address and thus overcome mac ad
    8·1 answer
  • A company is looking for an employee to help organize customer information for the sales team. Which computer field includes thi
    15·2 answers
  • Which security protocol for wireless networks attempts to establish the same security for them as would be present in a wired ne
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!