1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
8

Who is gossip girl.....

Computers and Technology
2 answers:
STatiana [176]3 years ago
7 0

Answer:

Kirsten Bell is the narrator for gossip girl but at the end it is revealed that Dan is gossip girl lol

Explanation:

Olin [163]3 years ago
5 0

Are asking about Kristen Bell?

You might be interested in
Qu'est-ce qui motive le choix d'une autre?
Monica [59]

Actions are important because they have real-world consequences, but in seeking to understand our own and other people’s actions, it works better to have an understanding of how an action is motivated by the beliefs and values that underlie it.

Explanation:

  • The reason or reasons one has for acting or behaving in a particular way. Motivation is also defined as the general desire or willingness of someone to do something.
  • It is crucial for all of us to realize that motivation is a choice. It is entirely up to us to motivate ourselves to do what it takes to reach our goals.
  • Everything you need is in your mind, and you alone can influence that feeling of motivation
  • People exhibit roughly equal amounts of love and selfishness, and we identify people whose balance is more loving or more selfish and make choices about which we want more of in our own lives.
  • The motivation scale is one way of thinking about how we gain what we want and who is affected by our choices.
  • Your values, priorities, purpose, goals, drive, learning, love, and hope all live in motivation.
8 0
3 years ago
(a) Explain the difference between a web browser and a search engine.​
mamaluj [8]

Answer: a browser is your access to the internet, and a search engine allows you to search the internet once you have access.

Explanation:

3 0
3 years ago
30 POINTS!!
bulgar [2K]

Answer:

online

the answer is online

7 0
3 years ago
A form of artificial intelligence that can perform many complex, _______ tasks. Select one: a. serialized b. repetitive c. non-r
Tanya [424]

Answer:

The correct answer is letter "C": non-repetitive.

Explanation:

Artificial Intelligence (AI) refers to all efforts mankind has made to program computer systems in a way they can interact as humans and imitate their actions. There are different types of AI based on their likeness to humankind. In such a scenario, AI can be reactive (respond to stimuli), self-aware (awareness capabilities), limited memory (learns to improve) or theory of mind (understands other intelligencies).

<em />

<em>All those types of AI are based on non-repetitive tasks that can perform different complex processes.</em>

6 0
4 years ago
A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered f
drek231 [11]

Answer:D)Format string attack

Explanation:

Format string attack is the type of attack that causes to change the application functioning .This attack access the memory of the string library. It occurs while the submission of the string as input and then gets tested due to application command.

Other options are incorrect because these are the attacks that don't happens in the application for the alteration of the flow. Thus, the correct option is option(D).

8 0
4 years ago
Other questions:
  • An example of live footage is when?
    10·2 answers
  • Who has access to the source code of proprietary software?
    15·2 answers
  • What are two ways to access the options for scaling and page orientation? click the home tab, then click alignment, or click the
    10·1 answer
  • What are the keys in all rows that sit between the touch keys
    11·1 answer
  • The text discusses three different steps when processing input. Which of the following is (are) one of those steps? (Check all t
    8·1 answer
  • Our readings so far explored computer hardware and software, in particular operating systems and application software. There are
    11·1 answer
  • What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web se
    13·1 answer
  • The ___ value is the number of time units a programmed timer is programmed to count before timed contacts change state.
    8·1 answer
  • Please help! first one to answer correctly gets brainliest and thanked
    7·1 answer
  • Please Complete in Java a. Create a class named Book that has 5 fields variables: a stock number, author, title, price, and numb
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!