1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seropon [69]
3 years ago
7

Hey anyone wanna zoom.

Computers and Technology
2 answers:
liubo4ka [24]3 years ago
7 0

cant

jh.kjbhtfghjhgffffffff gjjjjjj

Shalnov [3]3 years ago
5 0

Sure, but I won't unmute or turn on camara. What's the code?

You might be interested in
Select the correct answer from each drop-down menu. A company is recruiting for a web designer. What kind of candidate should th
prisoha [69]

Answer:a

Explanation:

8 0
3 years ago
Read 2 more answers
We have an array of Rectangles called rectangleArray and a function updateRectangle(rect) that takes a single rectangle as a par
Naddika [18.5K]

Answer:

Following are the code  

for(var k = 0; k< rectangleArray.length; k++) // iterting the loop

{

updateRectangle(rectangleArray[k]); // update the rectangle color

}  

Explanation:

  • In the given answer we have iterate over the loop will iterated until the length of rectangle array size-1
  • In every value of k, we have called the update rectangle function which changes the color of the rectangle of a rectangle class
4 0
3 years ago
What was the first carbonated drink to be introduced in the US?
adelina 88 [10]
Taco bell...........................................................................................................................................................................

6 0
3 years ago
Software designed to penetrate security controls, identify valuable content, and then encrypt files and data in place in order t
rjkz [21]

Software designed to penetrate security controls, and to unlock the encryption is known as Ransomware .

<h3>What is Ransomware?</h3>

Ransomware is known to be a kind of malware set up or made to encrypt files on a device, and makes any files and the systems that rely on them to be unusable.

Note that Software designed to penetrate security controls, identify valuable content, and then encrypt files and data in place in order to extort payment for the key needed to unlock the encryption is known as Ransomware.

Learn  more about encryption from

brainly.com/question/9979590

#SPJ1

3 0
2 years ago
Question in file i need this work done tonight
inysia [295]
This is to much work for 5 points cmon
3 0
2 years ago
Other questions:
  • What is the main piece of computer software on which every other piece of software relies?
    15·1 answer
  • VW discovered that its engineers had developed a software program that allowed some of its car models to run without emissions c
    14·2 answers
  • How does having a flexible mind help you become a better employee?
    14·1 answer
  • Rita wants to know the size of each image in a folder. Which view will help her find this information quickly?
    7·1 answer
  • Main characteristic of open source software<br> ?
    7·1 answer
  • Since the 1970s, local tv newscasts have developed a similar look. that's because
    9·1 answer
  • In object-oriented programming, the object encapsulates both the data and the functions that operate on the data.
    10·1 answer
  • Compare Fibonacci (recursion vs. bottom up)
    12·1 answer
  • Which statement best describes one reason why assembly language is easier
    14·1 answer
  • leon started a project to design and create a new video game for the animation studio where he develops graphics and animations
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!