1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
13

Can someone be my friend please i will accept you

Computers and Technology
2 answers:
Nataly [62]3 years ago
7 0

Answer:

No habla Ingles. proof: coca cola espuma

astra-53 [7]3 years ago
4 0
I will be your friend
You might be interested in
Which of the following is considered a benefit of using simulation programs? a. They allow users to experience potentially dange
erica [24]

Answer:

All of the above

Explanation:

7 0
3 years ago
How serious are the risks to your computer security?
ASHA 777 [7]

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

6 0
2 years ago
Tell me dynamo is easily charge 12 v battery if dc motor is 100w in electric cycle?
givi [52]
It depends on how you assemble the solar panel  you have to have at lest a 10 v's going in to the battery. 
4 0
3 years ago
Jeremy forgot where he saved a certain file on her computer. Therefore, he searches for all files with a .jpg file extension. Wh
Irina-Kira [14]
The jpg (or jpeg) extension stands for <span>Joint Photographic Experts Group. A file with this extension is an image, usually a photo. Other types of images are better stored using a lossless format.</span>
4 0
3 years ago
Read 2 more answers
What are some of the other operations that might be implemented for a stack?
melomori [17]

Answer:

push, pop, top, clear

Explanation:

push: add a new value

pop: remove and return top value

top: return top value without removing

clear: remove all values

6 0
3 years ago
Other questions:
  • What is the result of segmenting a network with a bridge (switch)? (Choose two)
    14·1 answer
  • Digital manipulation is commonly referred to as _______. Kodaking photo-oping Photoshopping photofixing
    6·2 answers
  • The program needs a Frisbee Golfer class.
    15·1 answer
  • 1. Which of the following is a drone? (1 point)
    10·1 answer
  • Paula needs to ensure that an animation she has created is repeated. Which option should she use to achieve this?
    6·1 answer
  • ARP only permits address resolution to occur on a single network.could ARP send a request to a remote server in an IP datagram?w
    9·1 answer
  • What is the result of successfully applying a Machine Learning (ML)<br> algorithm to analyze data?
    15·1 answer
  • What are two design elements that help MRAP trucks resist mines?
    15·1 answer
  • Multiple Choice
    9·1 answer
  • If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!