1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Burka [1]
3 years ago
9

Susie lives alone in New York where is her family lives in Florida

Computers and Technology
2 answers:
snow_tiger [21]3 years ago
3 0

Answer:

susie moved from her family

Explanation:

GrogVix [38]3 years ago
3 0

Answer:

they live in florida

Explanation:

waka waka waka dum

You might be interested in
URGENT!!!
LenaWriter [7]

Answer:

transaction

Explanation:

8 0
3 years ago
What are five don’ts of using a computer
Sonja [21]

Answer:

well, as long as there are no right or wrong answers, don't:

look to closely at the screen, as it may mess up your eyes

hold a drink above the computer, as it may spill and cause "sticky keys"

go to sites that you know will give your a computer a virus, cause they cost hundreds of dollars to repair, and some aren't able to come out

go on illegal sites/do illegal operations to the computer itself, because then you won't have a computer

Explanation:

3 0
3 years ago
Read 2 more answers
Alex's woodworking shop is trying to design a web page with Cascading Style Sheets (CSS). Alex would like create the new design
guajiro [1.7K]

Answer:

1. C) Embedded Style

2. C) User Agent Style

Explanation:

1. Alex will use Embedded style to create styles that apply only to the HTML document that the style was created. With Embedded styling; the rules can be embedded into the HTML document using the <style> element.

2. Since Alex has forgotten to give any style for all of his pages, the style that will be applied to his pages is User Agent Style. User Agent Style is the default style of a browser. The browser has a basic style sheet that gives a default style to any document and this style is called User Agent.

8 0
3 years ago
What are the limits of hashing and verifying that files haven’t changed?
earnstyle [38]

The hashing function can take any number of key-value pairs and there is no specific limit to it.

<h3>What is hashing?</h3>

Hashing is a file-based algorithm for producing a fixed-length bit string value. A file is essentially a collection of data blocks. The length of the data is reduced by hashing to a fixed number or key that represents the original string.

When hashing is employed, the hash function may plot all of the keys and values to what the real size of the table is, demonstrating that the hashing function can take any number of key-value pairs with no restriction.

However, if the passwords are hashed in encryption, recovering the passwords is extremely difficult.

Thus, the hashing function can take any number of key-value pairs and there is no specific limit to it.

Learn more about the hashing here:

brainly.com/question/13106914

#SPJ1

5 0
2 years ago
Which type of computer network ensures high security
Gwar [14]

Answer:

I elieve the answer for this is Juniper Network Firewall

Hope this helps

3 0
3 years ago
Other questions:
  • The two variables causing the point of difference between the time codes are the frequency and the count
    6·1 answer
  • Which program can damage your computer
    13·2 answers
  • The procedure call mystery(38) will yield which output? __________ a) 0 12 b) 12 0 c) 1 1 0 2 d) 1 1 1 1 e) 2 0 1 1 public void
    11·1 answer
  • Complete the getNumOfCharacters() method, which returns the number of characters in the user's string. We encourage you to use a
    15·1 answer
  • Which field can be used to track the progress on tasks that a user has created?
    10·1 answer
  • To the following is not a network connection LAM MAN SAN WAN
    9·1 answer
  • Create a program that generates a report that displays a list of students, classes they are enrolled in and the professor who te
    11·1 answer
  • #Write a function called alter_list. alter_list should have#two parameters: a list of strings and a list of integers.##The list
    11·1 answer
  • E-mail messages, instant messages (IMs), or text messages sent and/or received within an organization a. are not included on a r
    9·1 answer
  • 2. Which of the following is a shortcut key to Exit from any operation?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!