1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luda [366]
3 years ago
11

What does this say in morse code?

Computers and Technology
2 answers:
Furkat [3]3 years ago
4 0

Answer:

That it is time for lunch?

Explanation:

kari74 [83]3 years ago
4 0

Answer:

Never gonna give you up

Explanation:

can't believe I fell for that

You might be interested in
How does VIDEO CONFERENCE change the way we work today???
ArbitrLikvidat [17]
Well theirs less travel. Its alot easier. To work from home.

But this is what it said on a website
Most of them figure they can use conference call time to get 'real work' done, chat, read the newspaper.
7 0
3 years ago
Read 2 more answers
Differentiate between Scope and Linkage
Lera25 [3.4K]

Answer: The difference between the scope and linkage is as follows:-

  • Scope of the variable is defined as the variable view from different program parts whereas the linkage is described as the link that is made between the variable and the declaration function having the common name.
  • Scope of variable describes about the existing time of the variable in the program whereas linkage is defined for the name of variable present in the program is available at all time .

6 0
3 years ago
A marketing company setting up a new office in the city. Which type of contract should I sign for periodic maintenance of their
Fed [463]

Answer:

Fixed-term contract is most feasible in this scenario.

Explanation:

8 0
3 years ago
What percentage of teens plays video games?<br><br> A.97%<br> B.100%<br> C.74%<br> D.50%
inna [77]

Answer:

This would all depend on what kind of video games you are talking about, most people would say that playing on you phone is like playing a game on a console or a PC.  

most kids do play on these three things, so I'm going to go with answer choice C.

Explanation:

Reason why is because just like there are many who play, there are many who don't. I being one who prefers to read would like to make it known that not all teens do play video games, and that there are plenty of those who would rather do something productive.

7 0
3 years ago
Read 2 more answers
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Other questions:
  • At regular intervals the AP in an infrastructure network or wireless device in an ad hoc network sends a ____ frame both to anno
    8·1 answer
  • RADIAC instruments that operate on the ionization principle are broken down into three main categories based on what?
    15·1 answer
  • Select all that apply. Given the following code fragment, which of the things shown below happen when the statement on line 8 ex
    13·1 answer
  • What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t
    9·1 answer
  • ____ is the only automated disk-to-disk tool that allows you to copy data to a slightly smaller target drive than the original s
    5·1 answer
  • Use the drop-down menus to complete each sentence about the layers of the atmosphere.
    14·2 answers
  • In this lab, your task is to complete the following: Enable all of the necessary ports on each networking device that will allow
    9·1 answer
  • Explain two ways by which the calendar meets or fails to meet the criteria of showing the correct data
    7·1 answer
  • What is an operating system?<br>​
    11·2 answers
  • Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be u
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!