1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
riadik2000 [5.3K]
3 years ago
11

Why don't I have friends?

Computers and Technology
2 answers:
Papessa [141]3 years ago
7 0

Answer:

maybe you do not ask for them i will be your friend.

Explanation:

Alik [6]3 years ago
5 0

Answer:

maybe you need to speak up

You might be interested in
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
Lera25 [3.4K]

Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

<h3>What is Ransom malware?</h3>

This is known to be a kind of  malware that hinders users from gaining in or access to their system or personal files and it is one that often demands ransom payment so as to get access.

Therefore, Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

Learn more about Ransom  malware from

brainly.com/question/27312662

#SPJ12

6 0
2 years ago
In what way can a costume be deleted ?
alex41 [277]

Answer:

Clicking the "X" button towards the upper-right of each costume's icon in the Costume Pane will delete

Explanation:

5 0
3 years ago
What is the difference between (IF instructions &amp; WHILE instructions )<br> 0<br> 를 들<br> T<br> !
lara31 [8.8K]

Answer:

While statements determine whether a statement is true or false. If what’s stated is true, then the program runs the statement and returns to the first step. If what’s stated is false, the program exits the while and goes to the next statement. An added step to while statements is turning them into continuous loops. If you don’t change the value so that the condition is never false, the while statement becomes an infinite loop.

If statements are the simplest form of conditional statements, statements that allow us to check conditions and change behavior/output accordingly. The part of the statement following the if is called the condition. If the condition is true, the instruction in the statement runs. If the condition is not true, it does not. The if statements are also compound statements. They have a header (if x) followed by an indented statement (an instruction to be followed is x is true). There is no limit to the number of these indented statements, but there must be at least one.

7 0
3 years ago
You can view the existing Access Control Lists for a set of folders on a Windows system by right-clicking the folder you want to
NikAS [45]

Answer:

And clicking the security tab option.

Explanation:

Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.

By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.

3 0
3 years ago
In designing input by clinicians for an EHR system, which of the following would be effective for a clinician when the data are
svetoff [14.1K]

Answer:

Speech recognition

Explanation:

Speech recognition would be effective for a clinician when data entry is fairly repetitive and the vocabulary used is fairly limited and over time it as become a replacement for other forms of dictation.

3 0
4 years ago
Other questions:
  • Why is art important to heritage?
    10·1 answer
  • You can click a web page title on the _____ list to return to that page.
    10·1 answer
  • The specific term for expediting the delivery of software by breaking a task into smaller increments is called
    12·1 answer
  • In this exercise, your function will receive 2 parameters, the name of a text file, and a list of strings. The function will wri
    6·1 answer
  • Whats the answer to 9? i really need help with this in the next 20 minutes. ty if u help me!
    9·1 answer
  • Given six memory partitions of 100 MB, 170 MB, 40 MB, 205 MB, 300 MB, and 185 MB (in order), how would the first-fit, best-fit,
    10·1 answer
  • All of the following are true of using the database approach to managing data except Group of answer choices Decentralized manag
    6·1 answer
  • What is ABC computer?​
    14·1 answer
  • When should you create an outline?
    11·1 answer
  • What would a world where we have 2^128 (340 undecillion) Internet connected devices look like? How could that much Internet usag
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!