1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DanielleElmas [232]
3 years ago
12

Hey how are yall today?

Computers and Technology
2 answers:
Luda [366]3 years ago
5 0

Answer:

Great how are you today?

lyudmila [28]3 years ago
5 0

Answer:

I'm doing ok.

You might be interested in
A collection of entries posted on a web site and displayed in reverse chronological order (from newest to oldest entries), is kn
Zina [86]
A) Social Collaboration

Social Collaboration is a way for people to combine their information and make it easier to go through and to work well as a team.
7 0
3 years ago
Code in VMware Fusion?
ivanzaharov [21]
The answer to your problem is 76 because u have to multiply them u have to add them u have to divide but the original mumber
7 0
3 years ago
Which command is used to find the number of words,characters,paragraphs,or lines in a Microsoft Word Document?
borishaifa [10]
The word count from the tools drop down menu
6 0
3 years ago
Increment the intLocal, intStatic and intClass variables using the intone constant
n200080 [17]

Answer:

In VB.net the keyword Static is not meant the same as in C#. In VB.net the static variable is termed as the shared variable and has the scope throughout the class. And this intStatic and intclass means the same. And for intClass we use the shared keyword, as shown in the image attached.

Explanation:

Here num2 is a local variable, and num2 is a shared variable. a is constant and used for incrementing. The rest is explained in the image.

3 0
3 years ago
a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public
expeople1 [14]

Answer:

The answer is "Blended Threat"

Explanation:

In the given question some information is missing that is the option of the question, which can be described as follows:

a. Firewalls.

b. Mirror disc.  

c. Threat from the backdoor.

d. blended threat.  

It includes bugs malicious content like malware, grubs, and many other scripts. It helps in remembering things when you combine multiple tasks in a processor to help learn, Its combination of stuff is produced, and other choices were false that can be described as follows:

  • In option a, It provides security to malicious, that's why it is wrong.
  • In option b, It is part of storage system, that's why it is incorrect.
  • In option c, It bypasses the normal security system, that's why it is wrong
8 0
3 years ago
Other questions:
  • What are the two most important network-layer functions in a datagram network? what are the three most important network-layer f
    7·1 answer
  • Device that converts sound into electrical signals, which are sent to the computer or other recording device
    6·1 answer
  • What is the different between image processing and machine vision? Please explain with an example.
    11·1 answer
  • Which of the following can you do under the fair use exceptions?
    6·1 answer
  • For window 7 explain the steps you will use to find the available program you will list.
    13·1 answer
  • A. Draw a flowchart or write pseudocode to represent the logic of a program that allows the user to enter an hourly pay rate and
    8·1 answer
  • Josephine is in the process of creating ads within her Standard Display campaign. She finds that there are two main ad formats t
    5·1 answer
  • Do like TikTok??????
    14·2 answers
  • Software that displays advertising material when online.
    12·2 answers
  • Presentations must have what to be efffective
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!