1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alja [10]
3 years ago
14

Im bored, any anime recommendations? i probably watched whatever youre gonna say

Computers and Technology
2 answers:
kvv77 [185]3 years ago
7 0

Answer:

hero academy, dragon ball z, hunter x hunter, one punch man, Howl's Moving Castle.  

Explanation:

Alex777 [14]3 years ago
3 0

Answer:

Hi..

Explanation:

i have seen a lot of anime shows XD hunter x hunter, dbz, black clover, 7 deadly sins

You might be interested in
Mobile devices have their own OSs, tailored to their handheld needs, which means they are not immune to what?
NikAS [45]

Answer:

Malware

Explanation:

Malware is used in many types of software included handheld OS's

6 0
2 years ago
How to you compute for the total room sales​
Furkat [3]

Answer:

[checking question] - Error:

Please give complete/specific questions so more brainies will be able to help you! Check out what makes a great answer/question here: https://faq.brainly.com/hc/en-us/articles/360010136959-Answering-Guidelines ߷

7 0
3 years ago
You want to substitute one word with another throughout your
Hitman42 [59]
I’m pretty sure it’s “Find and paste”
8 0
3 years ago
In case of a suspected data breach, what course of action should a chief information security officer (CISO) take
guapka [62]

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

7 0
3 years ago
Which of the following is NOT an example of editing?
Genrish500 [490]

Answer:

ang answer po at proofreading written

content

Explanation:

if I wrong please correction me!

8 0
2 years ago
Other questions:
  • You can execute three main types of linux commands. what are they?
    8·1 answer
  • Answer all 1).The most common layout of keys on the keyboard is the _____ keyboard. ASDF QWERTY JKL QWOPY,
    5·2 answers
  • A newly opened law firm in Kirkland decides to create a small website that provides a brief introduction of the firm, its missio
    8·1 answer
  • Write the definition of a function reverse, whose first parameter is an array of integers and whose second parameter is the numb
    15·1 answer
  • What is the output?<br> &gt;&gt;&gt; password = "sdf#_356"<br> &gt;&gt;&gt; password.isalnum()
    8·2 answers
  • ¿Es aquel panel que controla la estructura de la tabla dinámica?
    14·2 answers
  • Miley met up with a bunch of her college friends after several years. She told them that she works for the sound department of a
    5·1 answer
  • 1. Who was the first lady programmer?​
    14·2 answers
  • If you double the force of and object what happens to the acceleration
    10·1 answer
  • Technology __________ guides how frequently technical systems are updated, and how technical updates are approved and funded.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!