1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mixas84 [53]
4 years ago
12

Who wana play among us the code is JFJDBF

Computers and Technology
2 answers:
vova2212 [387]4 years ago
6 0
Hmm among us bit boring it’s better if you don’t mind play freefire
kirill [66]4 years ago
6 0

Answer:

okay.......but how to download it on laptop?

Explanation?

You might be interested in
The extension name of a java bytecode file is ________.
GrogVix [38]
Class










------------------------------------
7 0
4 years ago
When you open a program, the hard drive
r-ruslan [8.4K]

the answer is c)loads into the RAM for high speed access.

5 0
3 years ago
Read 2 more answers
Computer ForensicsThere are many differences between public-sector and private-sector computer investigations. What do you see a
elena55 [62]

Answer:

For a private computer investigation into cyber crime the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

Explanation:

Computer forensics are used to resolve crimes like cyber crime, hacking, malfunctions and data interrupts.

Before a private computer investigations which is into cyber crime investigation can continue, the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's and the personnel's are not necessarily supposed to complete the courses

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

5 0
4 years ago
Explain briefly why we say that the "Web" exists only in our minds.
hammer [34]

Answer:

The Web is the system of web pages and sites that uses the Internet to pass the files across. It was developed in the late 1980’s by Tim Berners-Lee, and you <em>need a Web Browser to access it</em>. This could either be in a PC, a mobile phone or one of the new iPods.

Explanation:

I guess you could look at it as just one of many services that use the Internet – other services include e-mail, internet telephony and peer-to-peer file transfers. Hope this helps ^-^

4 0
3 years ago
Help, please!! A file named "games.txt" exists and has 80 lines of data. You open the file with the following line of code. aFil
Aliun [14]
I’m not 100% sure about this but I think it is A
8 0
4 years ago
Other questions:
  • a. Is there any functional difference between the class being instantiated in the following two ways? Balanced bal = new Balance
    15·1 answer
  • python An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is a phrase an
    14·2 answers
  • How many cells does the organism have?\
    5·2 answers
  • What is A cell that can hold or display data​
    11·1 answer
  • The keys in the computer's keyboard are represented by a numeric code agreement (ASCII). For example A is 65 and a is 97.
    12·1 answer
  • Question 4: What will be the output of the code? Show a complete analysis.
    6·1 answer
  • write a program in which the user can enter X amount of numbers. Once the user has enter 10 positive numbers, the user may not e
    7·1 answer
  • What is the BCC feature used for?
    12·2 answers
  • What is the missing line of code?
    13·1 answer
  • Who is maintain data and time of computer?​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!