1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
3 years ago
15

SIKILDIM OF NAPİM TÜRK OLAN VARMI

Computers and Technology
1 answer:
vekshin13 years ago
8 0

ben varım
bende sıkıldım ya

You might be interested in
To incorporate media such as audio or video into a PowerPoint presentation, a user would first navigate to the _____ tab.
Nadya [2.5K]

The answer is the Insert tab or the recording tab in PowerPoint 2016

You can use the insert tab in most versions of the Microsoft PowerPoint applications to add media files to your presentations. However, we have the recording tab introduced in PowerPoint 2016. This tab can also be used to add a screenshot, a recording, or a video to a slide

3 0
4 years ago
Which statement is false?
Tanzania [10]

Answer:

b) A type parameter name must be unique among different generic methods.

Explanation:

<u>These statements are true</u>

Each type parameter list contains one or more type parameters, separated by commas.

The type parameters act as placeholders for the types of the arguments passed to a method.

The type parameter names throughout the method declaration must match those declared in the type parameter list.

<u>But</u>

A type parameter name may be different among different generic methods.

7 0
4 years ago
What measures are needed to trace the source of various types of packets used in a DoS attack? Are some types of packets easier
cestrela7 [59]

<u>Explanation:</u>

Note, a DoS (Denial of Service) attack is <u>different in scope from a DDoS (Distributed Denial of Service) </u>attack. In a DoS attack, the attack on the website's network comes from just a single source (IP address) repeatedly, while in a DDos attack several Ip addresses or sources attack the network of a website.

To trace the source of various types of packets used in a DoS attack (which of less complexity than a DDos attack), a software application like Wireshark could be used to measure trace the packets used in the attack.

4 0
3 years ago
1.A tachometer measures:
Art [367]
1. D


2. D


I hope I helped :)
3 0
3 years ago
Write is the use of find and replace cpmmand​
jeka94

Answer:

Control H is the command to Find and Replace. It is used to find a word and replace the word with something else.

Explanation:

5 0
3 years ago
Other questions:
  • Your crt monitor flickers. what should you do
    6·1 answer
  • Which term defines a star system with two stars?
    13·2 answers
  • How do i know if i got flash installed onchrome
    5·1 answer
  • Code the function (insertNth list N insValue) which constructs a new list by inserting the specified insValue into the list afte
    6·1 answer
  • If you want to add text in an area of a slide where a content placeholder is not located, you can insert a(n) _______________.
    7·1 answer
  • Which line of code will print Python is cool! on the screen?
    9·2 answers
  • 1. (15%) Consider a computer system with three users: Alice, Bob, and Cyndy. Alice owns the file a, and Bob and Cyndy can read i
    9·1 answer
  • ________ computers are specially designed computer chips that reside inside other devices such as a car.
    11·1 answer
  • There are types of templates​
    5·1 answer
  • Define a SCHEME function, unzip, which takes a list of pairs ((a .b)... (an .bn)) and returns a pair consisting of the two lists
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!