1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sphinxa [80]
3 years ago
13

STAY AWAY FROM AND REPORT mariaivanovaloveyou!!!!!!! SHE IS A BRAINLY USER AND KEEPS POSTING INAPPROPRIATE PICTURES OF HER BODY

WHICH IS SO GROSS!!!!!
Computers and Technology
1 answer:
Bond [772]3 years ago
7 0

Answer:

Yep, saw her posts. Thanks for the warning though. I reported one of her posts. It's just another example of how desperate people are and what measures they will take to get attention. She'll probably be banned soon

Explanation:

Thank you for the warning though. I hope this reaches more people.

You might be interested in
All of the following are ways to improve the mobile experience for a website visitor EXCEPT:
Jobisdone [24]

Answer:

Adding more links to the page.

Explanation:

User experience design, UED, is a concept or a process of software development application life cycle that graphically presents a clients project to reflect the needs, want and interactivity of the users.

There are certain principles that governs the design of user interactive web and mobile interfaces. A user interface has to be simple, easy to interact with, give a good feel, signing into email, phone, laptop, mobile app etc, should also be made easy.

Covering the screen with link, makes it difficult to navigate without triggering a link.

3 0
3 years ago
You are a networking consultant who has been asked to penetration test the network of a small business. you located a target wir
cluponka [151]
<span> In a network that uses WPA2-PSK encryption you can bypass the encryption by using the weakness in the WPA2-PSK system and that is the following:the encrypted password is shared in what is known as the 4-way handshake. </span> When a client authenticates to the access point, the client and the AP go through a 4-step process of authentication.
8 0
3 years ago
For whover needed pont
podryga [215]

Answer:

Thank you have a nice day:)

8 0
3 years ago
Read 2 more answers
output device. Vrite very short answer of the following questions. What is computer hardware? Which dovico in lini nwhich device
kirill115 [55]

Computer hardware is the physical components that a computer system requires to function.

Have a gr8 day ahead ✌️

7 0
2 years ago
I am trying to test out the software Classroom relay and I am just ask if there is any way kids can stop Classroom relay form se
Ratling [72]

Answer:

just don't share your screen in the class or if your a teacher just call them out

Explanation:

8 0
2 years ago
Read 2 more answers
Other questions:
  • Which individual of the following would be most likely to be directly concerned with web security?
    14·2 answers
  • Which of the following should you always wear to avoid being thrown from a vehicle and then crushed if it tips over?
    12·2 answers
  • which of the following is involved in ordering an outline. A.grouping B.merging C.organizing D.arranging
    10·1 answer
  • An indicator is a comprehensive analysis of critical information
    8·1 answer
  • Any executable files???
    5·1 answer
  • Some one help pls will mark brainless !!!!!
    13·1 answer
  • Which pickaxe in minecraft to use?
    14·1 answer
  • Suppose that you have the following declaration:
    7·1 answer
  • write a program that asks the user for a month number and displays the number of days that month has?
    7·2 answers
  • What does FTTB mean?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!