1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ipatiy [6.2K]
4 years ago
12

Does anybody want to be my friend

Computers and Technology
2 answers:
Gekata [30.6K]4 years ago
6 0

Answer:

Yeah sure, mines aatelophxbia, i'm 14. what games you play?

Hunter-Best [27]4 years ago
3 0

Answer:

I have some stuff but besides Xbox

You might be interested in
Why Java Script uses the prefix Java in itsname?
kifflom [539]

Answer:

Java in JavaScript does not correspond to any relationship with Java programming language.

Explanation:

The prefix Java in Javascript is there for historical reasons.

The original internal name of Javascript when it was created by Brendan Eich at Netscape was Mocha. This was released to public as Livescript in 1995. The name Livescript was eventually changed to Javascript in Netscape Navigator 2.0 beta 3 release in December 1995 after Netscape entered into an agreement with Sun Microsystem. The primary purpose of change of name seemed to be as a marketing aid to benefit from the growing popularity of Java programming language at that time.

4 0
3 years ago
Technology can most broadly be defined as anything that does which of the following ?
Anastasy [175]
I would say A. Allowing us to improve efficiency in the workplace has helped grow our economy and we can thank technology for that. Due the it always improving our lives only get that much easier.
5 0
4 years ago
How can you block attackers, who are performing reconnaissance and probing, with nmap and nessus port scanning and vulnerability
Tresset [83]
<span> You can block attackers, who are performing reconnaissance and probing, with NMAP and Nessus port scanning and vulnerability assessment scanning tools by i</span>dentifying the digital signatures of common reconnaissance and probing tools such PING, scans performed by Nmap, Nessus®, etc. The IDS and IPS devices should be programmed to specifically alert and block reconnaissance and probing IP packets that are commonly used by these attack tools. 
7 0
3 years ago
What's the minimum storage for onedrive e2
cupoosta [38]
It should be 1 TB per user
3 0
3 years ago
Noise can be a barrier to communication. True or False ​
ziro4ka [17]

Answer:

True

Explanation:

This is true because noise is one of the most common communication barriers.

5 0
3 years ago
Other questions:
  • While building a high-end gaming system, you are attempting to install the EVGA GeForce GTX 1080 graphics card and discover ther
    9·1 answer
  • Maria is developing an online gaming website. She is working on an interactive game that has a central character guiding the vis
    14·2 answers
  • What default length is used for the ospf dead interval?
    14·1 answer
  • What is an example of a governmental influence ?
    9·2 answers
  • 1. Trust can be built in a relationship if:
    15·1 answer
  • Each sentence in the paragraph below has a number. Choose the number of two sentences that are in the wrong order in this story.
    14·1 answer
  • What are Manuscript signs​
    8·1 answer
  • Plsss help me plsssssss
    11·1 answer
  • Arrays of structures ________. Group of answer choices None of the above. are automatically passed by reference cannot be passed
    6·1 answer
  • What are 3 of the most important things about internet safety that you would recommend and why
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!