1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastasy [175]
3 years ago
14

Anyone good at graphics?

Computers and Technology
1 answer:
Alexxx [7]3 years ago
7 0
We need the question
You might be interested in
Cho một File Input.TXT chứa dãy nhị phân liên tiếp của một văn bản đã mã
Verizon [17]

Answer:

hyfchoofdcgvjoo

Jajosoxjkq

4 0
3 years ago
Read 2 more answers
The Go To feature can be accessed from which of the following dialog boxes?
Aliun [14]

Answer:

hoose the answer.

•Font

•Open

•Insert Hyperlink

Explanation:

4 0
3 years ago
FIrst person to put lyrics to wap gets brainliest 100% NO CAP
Firdavs [7]

Answer:

i got u

Explanation:

****** in this house

There's some ****** in this house

There's some ****** in this house

There's some ****** in this house (Hol' up)

I said certified freak, seven days a week

Wet and gushy, make that pullout game weak, woo (Ah)

[Chorus: Cardi B]

Yeah, yeah, yeah, yeah

Yeah, you dealin' with some wet and gushy

Bring a bucket and a mop for this wet and gushy

Give me everything you got for this wet and gushy

[Verse 1: Cardi B & Megan Thee Stallion]

Beat it up, baby, catch a charge

Extra large and extra hard

Put this cookie right in your face

Swipe your nose like a credit card

Hop on top, I wanna ride

I do a kegel, I'm kinda wild

Look at my mouth, look at my thighs

This water is wet, come take a dive

Tie me up like I'm surprised

Let's roleplay, I'll wear a disguise

I want you to park that big Mack truck right in this little garage

Make me dream, make a stream

Out in public, make a scene

I don't cook, I don't clean

But let me tell you how I got this ring (Ayy, ayy)

5 0
3 years ago
What is computer virus​
IRINA_888 [86]

Answer:

A type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.

Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.

8 0
3 years ago
Read 2 more answers
A type of sensor used to detect which way around a device is being held. ​
Marta_Voda [28]
There’s 3 main ones accelerometer, gyroscope, and magnetometer.
8 0
3 years ago
Other questions:
  • Which of the following is not a standard method called as partof the JSP life cycle?
    5·1 answer
  • How do you do these questions? The first two questions could have multiple answers and the third is one answer only.
    7·1 answer
  • Which group on the Home Ribbon contains the line spacing attribute?
    9·2 answers
  • Write a statement that declares a PrintWriter reference variable named output and initializes it to a reference to a newly creat
    5·1 answer
  • To what type of user does he most likely have access? Jae is using a computer at the public library to do research she's able to
    9·1 answer
  • Complete the sentence. <br><br> ____ Is the study and use of very small technology units
    14·1 answer
  • Rate monotonic Analysis (RMA) is a model for predicting whether or not a system will meet its timing as well as throughput requi
    6·1 answer
  • If you change the text to bold,you are changing the what?
    9·1 answer
  • What relationship do MP3s and MP3 players have with video files?
    11·1 answer
  • A(n) ____________ calculator is a device that assists in the process of numeric calculations but requires the human operator to
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!