1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kiruha [24]
3 years ago
5

Who wants to play nba 2k20 ps4

Computers and Technology
2 answers:
SOVA2 [1]3 years ago
6 0

Answer:

Yo I’m down

Explanation:

Georgia [21]3 years ago
4 0

Answer:

bet

Explanation:

You might be interested in
Pls can anyone be so kind and answer this question.....i need the answer urgently
mixas84 [53]

Answer:

so u have to be smaet

Explanation:

8 0
3 years ago
1 Type the correct answer in the box. Spell all words correctly. Which skill type refers to the ability to interact and communic
joja [24]

Answer:

interpersonal skills

Explanation:

please rate

8 0
3 years ago
What is a peripheral device?
saul85 [17]

Answer:

a peripheral device is a device used to put information into as well as get information out of a computer

Explanation:

4 0
3 years ago
In a bubble sort for a list of length n >= 2, in each iteration, the first step is to compare_______.
Hunter-Best [27]

Answer:

the consecutive two elements and swap them based on the value which is larger if we go for ascending order

Explanation:

bubble sort compares 2 consecutive elements of the list and swap them. in one iteration one value will be placed correctly depending on the sorting order either ascending or descending

7 0
3 years ago
You are the head of the corporate security department, and the Microsoft teamhas asked you for some assistance in setting the pa
IgorC [24]

Answer:

d. Local Security Policy

Explanation:

Local security policy refers to different security settings that are present on a local computer. Local security policy can include administrative rights assignments and password.

This can also mean policies that enables an administrators to set users privileges by so doing guiding what users are permitted to do on the computer.

6 0
3 years ago
Other questions:
  • How do you send a private message on facebook to someone who is not your friend?
    9·1 answer
  • Write the percentage 5 1/4 as a decimal​
    8·1 answer
  • If we develop a new policy for our environment that requires us to use complex and automatically generated passwords that are un
    11·1 answer
  • True or False? To use a C++ library function, you must use an #include directive to include the appropriate header file.
    8·1 answer
  • Which kind of file would be hurt most by lossy compression algorithm
    8·2 answers
  • In the RSA system, the receiver does as follows:1. Randomly select two large prime numbers p and q, which always must bekept sec
    6·1 answer
  • To see the formula in a cell, look at the___
    5·1 answer
  • 17. Write a SELECT query for the palateE4 database that produces a result grid listing paintName, and a count of the occurrences
    12·1 answer
  • The purpose of data analysis is to filter the data so that only the important data is viewed.
    7·1 answer
  • Using AI to filter potential job applicants might be considered _____
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!