1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mihalych1998 [28]
2 years ago
8

Anyone wanna play Smash Ultimate. I'm a Link main (that doesn't mean I camp, thats young link) who plays competitve with legal s

tages. I also play Animal Crossing too sometimes. hmu in the comment
Computers and Technology
1 answer:
nirvana33 [79]2 years ago
6 0

Answer:

I don't play that,but wanna play among us?

You might be interested in
What is the best method to avoid getting spyware on a machine
monitta

Answer: The best method to avoid getting spyware on a user machine is to download software only from trusted websites. And depending on the machine it might say that "This download you are about to install might have spyware or malware and it might infect your laptop" "Do you wish to continue?"

3 0
2 years ago
Which of the following are peripheral devices?
Fittoniya [83]

Explanation:

I think it's speakers,

7 0
3 years ago
Read 2 more answers
If AL contains binary 1000 1111, which one will show the information of the binary bits in AL after performing operation SHR AL,
padilas [110]

Answer:

a) AL will contains 0011 1100

Explanation:

In assembly language, shifting bits in registers is a common and important practice. One of the shifting operations is the SHR AL, x where the x specifies that the bits be shifted to the right by x places.

SHR AL, 2 therefore means that the bits contained in the AL should be shifted to the right by two (2) places.

For example, if the AL contains binary 1000 1111, the SHR AL, 2 operation will cause the following to happen

Original bit =>                                        |   1  |  0 |  0  |  0  |  1 |  1 |  1 |  1 |

Shift once to the right =>                |  1 |   0 |  0  |  0  |  1 |  1 |  1 |  1 | (0) |

Shift once to the right =>          |  1 |  0 |  0  |  0  |  1 |  1 |  1 |  1 | (0) | (0) |

Notice;

(i) that there are two shifts - one at a time.

(ii) that the bits in bold face are the bits in the AL after the shift. Those that in regular face are those in the carry flag.

(iii) that the new bits added to the AL after a shift are the ones in bracket. They are always set to 0.

5 0
3 years ago
This graph shows both a reflection and a
Tpy6a [65]

Answer:

y=-3x-×-1 I think it's answer is it

6 0
3 years ago
Read 2 more answers
What two features distinguished Windows 2.0 from Windows 1.0?
zysi [14]
This question is a bit ambiguous as there were a few features that were added and any could be perceived as distinguishing depending on what you look for in your OS. I do believe this is in reference to the Wikipedia article on Windows 2.0 though as the first two listed features make note of Windows 1.0 specifically, therefore:

Windows 2.0 allowed windows to overlap, Windows 1.0 could not do this.

Windows 2.0 introduced new and more complex keyboard shortcuts and terminology such as "Minimize" and "Maximize" vs. Window 1.0's "Iconize" and "Zoom"

Source: https://en.m.wikipedia.org/wiki/Windows_2.0
5 0
3 years ago
Other questions:
  • Consider the following scenario: "You are an assistant to the accounting manager for a small company that sells sports equipment
    5·1 answer
  • Access controls are enforced automatically in FMS service routines that access and manipulate files and directories.
    9·1 answer
  • Information technology is the study of managing, processing, and retrieving information.
    5·1 answer
  • Websites that are designed to adapt gracefully to any screen size use a technique called
    5·1 answer
  • What are some facts about webmasters?
    10·1 answer
  • What is the difference between simple and complex waveforms?
    10·1 answer
  • You should structure the<br> first before you search for a relevant picture.
    11·1 answer
  • Write a program that gets a list of integers from input, and outputs the integers in ascending order (lowest to highest). The fi
    5·1 answer
  • It specifies the amount of memory needed to store data.
    7·2 answers
  • In what way, if any, is the impact of a given risk affected by the timing of a project?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!