1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serjik [45]
3 years ago
11

NO LINKS OR I WILL DELETE YOUR FORTNITE ACCOUNT

Computers and Technology
1 answer:
ozzi3 years ago
5 0

Answer:

can i have ur fortnite account if u hav one and dont use it :) i only say that cuz u mentioned fortnite

Explanation:

with the free version you can add effects (cheap effects) cut the video, crop some parts. and posting leaves a watermark until u buy money

You might be interested in
What symbol should you look for to determine who owns the intellectual property of a website? the logo the web address the domai
devlian [24]

Answer:

Answer:

the logo of the company or corporation

Explanation:

Usually, the symbol that determines who owns the intellectual property is the logo of the company or corporation. The logo of a website is technically the logo of the brand which has the rights to all of the information represented on the site and ultimately the intellectual property of the site itself. Since there are various board members that usually make up the company that owns the intellectual property, the logo is a way of representing all of these members as a single entity.

8 0
2 years ago
Read 2 more answers
What term is used to describe a chipset developed and promoted by the U.S. government from 1993 to 1996 as an encryption device
Flauer [41]

Answer:

Clipper Chip Kerberos National Information Infrastructure (NII)

Explanation:

The Clipper chip was developed by the NSA (National Security Agency) for enciphering and deciphering messages. It was promoted for voice transmission in telecommunications companies. The Clipper chip was announced in 1993, not all consumers and manufacturers embraced it and only last to 1996.

3 0
3 years ago
Which of the following is true of how packets are sent through the Internet?
astra-53 [7]

Answer:

It is A: Packet metadata is used to route and reassemble information travelling  through the internet.

Explanation:

Step 1: The Internet works by chopping data into chunks called packets. Each packet then moves through the network in a series of hops. Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee

Step 2: Entering the network

Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee.

Step 3: Taking flight

The next hop delivers the packet to a long-haul provider, one of the airlines of cyberspace that quickly carrying data across the world.

Step 4: BGP

These providers use the Border Gateway Protocol to find a route across the many individual networks that together form the Internet.

Step 5: Finding a route

This journey often takes several more hops, which are plotted out one by one as the data packet moves across the Internet.

Step 6: Bad information

For the system to work properly, the BGP information shared among routers cannot contain lies or errors that might cause a packet to go off track – or get lost altogether.

Last step: Arrival

The final hop takes a packet to the recipient, which reassembles all of the packets into a coherent message. A separate message goes back through the network confirming successful delivery.

8 0
4 years ago
Read 2 more answers
associate true with the variable has_dups if the list list1 has any duplicate elements (that is if any element appears more than
nordsb [41]

True. If the list contains any elements that appear more than once, then it has duplicate elements and the variable has_dups is True.

What is variable?
Throughout computer programming, a variable is indeed a named container for a specific set of bits or type of data. A variable is indeed an abstract storage location with an associated symbolic name that holds some unidentified quantity of information made reference to as a value. Eventually, a memory address may be used to link or identify a variable. In addition to using the variable name or the variable itself, depending on circumstances, the stored value is typically referenced by the variable name. The name can be used independently of the precise information it represents thanks to the separation of name as well as content. During run time, a value can be bound to an identification number in computer source code.

To learn more about variable
brainly.com/question/29360094
#SPJ1

7 0
1 year ago
structured analysis is called a(n) _____ technique because it focuses on processes that transform data into useful information.
zzz [600]

Answer:

Process - centered technique

Explanation:

Process - centered technique -

It is the method , where the useless or waste data is converted to some useful information , is referred to as process - centered technique .

This conversion process requires some activities , like  maintenance/support  , implementation , design , analysis and  planning .

Hence , from the given information of the question,

The correct option is Process - centered technique .

4 0
3 years ago
Other questions:
  • How can i do a back up on one computer and save it to the hard drive in another computer without it being seen by others on the
    9·1 answer
  • A girl scout troop with 10 girl scouts and 2 leaders goes on a hike. When the path narrows, they must walk in single file with a
    12·1 answer
  • In most software packages, the function key F1 is used to run the _____program.
    10·1 answer
  • Describe how asymmetric encryption is used to send a message from User A to User B that assures data confidentiality, authentica
    9·1 answer
  • Design 3 classes: Computer - Superclass
    11·1 answer
  • HELP!!!
    15·2 answers
  • Write a program code which asks for 80 numbers between 100 and 1000 to be entered.
    7·1 answer
  • Analog computers are general purpose computers : true ? or false ?​
    8·1 answer
  • How can the system administrator give the executive assistant the ability to view, edit, and transfer ownership of all records,
    6·1 answer
  • What is software engineering? What are the objectives of software engineering?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!