1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cerrena [4.2K]
4 years ago
6

What was the best Metal Gear Solid you enjoyed the most?​

Computers and Technology
1 answer:
kenny6666 [7]4 years ago
7 0

My personal favorite is Metal gear solid 3: <em>Snake eater</em>.

You might be interested in
What is the difference between special purpose software and customized software​
Leviafan [203]
The choice of a specific software product model depends on your business specs. General-purpose solutions cover a set of the most common functions. The tailor-made one allows you to stand out for the individual approach for business processes and tasks.Jul 27, 2020
8 0
3 years ago
Read 2 more answers
What is the difference between hardware and software?
DIA [1.3K]

Answer:

Computer hardware is any physical device used in or with your machine, whereas software is a collection of code installed onto your computer's hard drive. For example, the computer monitor you are using to read this text and the mouse you are using to navigate this web page are computer hardware.

Explanation:

4 0
4 years ago
What are the limitations of the ASCII character set? State why it is limited in this way?
dedylja [7]
The problem with ASCII or extended ASCII is that the ASCII system can only represent up to 128 (or 256 for EASCII) different characters. The limitation on the number of character sets means representing character sets for several different language structures is not possible.
7 0
4 years ago
Why is it important not to leave your personal information on a public computer?
zheka24 [161]

Answer:

B. Someone can steal the information and hurt you.

Explanation:

People can hack into your accounts using your informations and spread hurtful things that can make people hurt. The people will think that you posted this (even if you didn't) and blame you.

7 0
2 years ago
You can view the existing Access Control Lists for a set of folders on a Windows system by right-clicking the folder you want to
NikAS [45]

Answer:

And clicking the security tab option.

Explanation:

Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.

By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.

3 0
3 years ago
Other questions:
  • A/An _______ occupies a continuous block of multiple pieces of data.
    6·2 answers
  • Should i buy the Samsung s10+ or wait for s11 or any other phones you guys suggest?
    6·2 answers
  • Why is Charles de Gaulle significant?​
    9·1 answer
  • You are capturing packets with a network sniffer and notice a number of packets that are flagged by the sniffer and described as
    5·1 answer
  • O novo funcionário da equipe de desenvolvimento de sistemas está aprendendo os termos mais utilizados no dia a dia da empresa. A
    7·1 answer
  • We will cover email use and management. Training topics include:
    5·1 answer
  • A drug like cocaine cause more dopamine to be produce in the brain
    15·2 answers
  • Задание: Построить иерархию классов в соответствии с вариантом задания. Построить диаграммы классов.
    8·1 answer
  • What is the minimum ethernet frame size that will not be discarded by the receiver as a runt frame?.
    8·1 answer
  • Jacob holds a Computer Hacking Forensic Investigator (CHFI) certification. Which of the following responsibilities should Jacob
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!