1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastovalidia [21]
4 years ago
9

Whoever understands this first and replies will be the brainliest. Road work ahead?

Computers and Technology
2 answers:
Scorpion4ik [409]4 years ago
7 0

I SURE HOPE IT DOES (this is the best vibe if you dont get this you are an uncultured swine)

alexira [117]4 years ago
4 0

What is there to understand? Are you guys WEEABOOS (aka otaku’s)????!?!

You might be interested in
In public-key encryption, the two keys–one for coding and one for decoding–are known as ________.
Feliz [49]
Public key and private key  - In public key encryption, a pair of keys is used (public key and private key). The public key can be made available publicly, while the private key is only known  by the owner. The public key is used to encrypt the message, while the private key is used to decrypt the message.
5 0
3 years ago
Câu 4. Trong môi trường lập trình CodeBlocks phím F9 dùng để: A. Biên dịch chương trình B. Chạy chương trình C. Soạn thảo chương
Debora [2.8K]

Answer:

câu trả lời là c nha

Explanation:

7 0
3 years ago
PLEASE HELP WHATS THE ANSWER
Mkey [24]

Answer:

C

Explanation:

A ends the whole html stuff

B starts a link

D is just the file extension for html files

4 0
3 years ago
Read 2 more answers
These commands are established by combatant commanders when authorized by the Secretary of Defense through the Chairman of the J
Romashka-Z-Leto [24]

Answer:

b. Combatant Command

Explanation:

The Combatant commands are commands which are primarily authorized by the Secretary of Defense with approval from the President. They are then executed by the Combatant Commanders (CCDR's), who receive information from the higher authorities through the Chairman of the Joint Chiefs of Staff. The combatant commanders head the combatant commands and are usually four-star Generals. The combatant commands have a broad and continuing purpose.

They ensure synergy for the command and control of the United States military forces. They are formed on the basis of geography or function. The United States Defense Department has eleven (11) combatant commands which serve either a geographic or functional purpose.

8 0
4 years ago
In an AND truth table.
wariber [46]

Answer:

1. A

2. B

Explanation:

1. For an AND truth table to output true, all it input must be true. If one or any of the input is false, the output will be false. The truth table for AND is written below:

INPUT      INPUT      OUTPUT

FALSE      FALSE      FALSE

FALSE      TRUE        FALSE

TRUE        FALSE      FALSE

TRUE        TRUE        TRUE

2. The Internal Revenue Service web site is a good search tool when looking for income tax information. The federal government main web site might look like a correct option but one must understand that the federal government will only make the policy while the Internal Revenue Service will implement the policy.

7 0
4 years ago
Other questions:
  • Before desktop computers made italic fonts available in the home and office, writers used underlining to:
    12·1 answer
  • 1) What is Net beans
    6·1 answer
  • A formula =A1+B2 is in cell D8. If you copy that formula to cell D9, what is the new formula in cell D9? A. '=A1+B2 B. '=A2+B3 C
    8·2 answers
  • How to find no of Distinct triangles in a polygon?
    10·1 answer
  • Which of the following emerging technologies uses the principle of chromosomes to identify suspects?
    10·1 answer
  • Evan is borrowing a friend's laptop to check out some groovy music files. What can Evan look for to quickly identify
    6·1 answer
  • If you want an app to reach the largest possible audience, which two platforms should you use?
    10·1 answer
  • Ray is recording his voice for a presentation and can adjust the bit depth. Increasing the bit depth will mean that sound is sam
    12·1 answer
  • In your own words discuss 4 major strength and weakness<br> of<br> computer
    13·1 answer
  • During an election year, why would a senator want to determine a mode?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!