1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxandr [17]
3 years ago
15

I know this aint like a question about school work, but I really need help with a problem. My mom took my phone away for like tw

o months now:(
I really need it back, but I am afraid to ask her and I don't want to get a lecture. Please help me with some kind of alternative so I can text people:(((
Computers and Technology
2 answers:
ANTONII [103]3 years ago
5 0

Answer:

just wait till shes happy then ask her

Explanation:

igomit [66]3 years ago
4 0

Answer:

use hangouts and fb messenger to text people

Explanation:

You might be interested in
For the following 4-bit operation, assuming these register are ONLY 4-bits in size, which status flags are on after performing t
m_a_m_a [10]

Answer:

All flags are On ( c, z , N  )

Explanation:

Given data:

4-bit operation

Assuming 2's complement representation

<u>Determine status flags that are on after performing </u> 1010+0110

    1   1

    1  0   1  0

    0  1   1  0

  1  0 0 0 0

we will carry bit = 1 over

hence C = 1

given that: carry in = carry out there will be zero ( 0 ) overflow

hence V = 0

also Z = 1      

But the most significant bit is  N = 1

8 0
3 years ago
Additional rows and columns are inserted into a table using the
Paladinen [302]
The Option D , Table Tools Insert
6 0
3 years ago
Write an algorithm to check whether the given number is divisible by 2,3 and 6 or not​​
olga2289 [7]

Answer:

Start

Input n, 2

Calculate if (n%2==0) then is divisible else not divisible

Output number is divisible or not

Stop

Explanation:

3 0
3 years ago
Which of these is an application to control
N76 [4]

Not sure if your asking what certain application or the definition. But the definition: A security practice that blocks or restricts unauthorized applications from executing in ways that put data at risk.

6 0
3 years ago
Write a little man program that accepts three values as input and produces the largest of the three as output.
ki77a [65]
Required: program to return the largest of three numbers.

pseudocode

input parameters, int A,B,C;
int T; // temporary storage
if (A>B) T=A;
else T=B;
if (T>C) print(T);
else print(C);


5 0
3 years ago
Other questions:
  • Deterime the minimum number of multiplication operations needed to compute the following. Show the order of the computations.
    10·1 answer
  • What is the correct html element for inserting a line break?
    12·1 answer
  • The tremendous diversity ofthe source system is the primary reason for their complexity. Doyou agree/ If so, explain briefly why
    11·1 answer
  • Which type of CPU instruction performs arithmetic calculations and stores the results in memory?
    14·2 answers
  • Right-of-way is __________. A. guaranteed by Florida law B. the privilege of immediate use of the road C. earned by aggressive d
    15·1 answer
  • Write a function using statements called Print Reportl) which will take no float
    10·1 answer
  • 87. Labor Department surveys show a close relationship between job<br> security and
    9·1 answer
  • What does it mean when someone silences notifications?.
    13·1 answer
  • Explain how information in an access log could be used to identify the true identity of an impostor who has acquired unauthorize
    13·1 answer
  • What does playstation network is currently undergoing maintenance?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!