1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Julli [10]
3 years ago
14

Wanna be friends anyone

Computers and Technology
2 answers:
Scilla [17]3 years ago
6 0

Answer:

MEEEEEEEE

Explanation:

Klio2033 [76]3 years ago
3 0

Answer:

lol nice pic sure

Explanation:

You might be interested in
B. List any four major drawbacks of the first generation computer​
d1i1m1o1n [39]

Answer:

Terribly low storage space, limited to mathematics/computing, required entire rooms to use, and low information yield for hours of processing.

Explanation:

3 0
3 years ago
Should organizations that promote free trade have environmental or social checks and balances?
Step2247 [10]
it depends on the organization some organizations are more monopolizing than others so it really just depends on the organization that it talks about
6 0
3 years ago
Which of the following was the first full-length film to be done completely in 3-D imaging
motikmotik
Toy story I believe is the answer
6 0
3 years ago
Read 2 more answers
email communication has its own set of etiquette guildelines for users to follow if they want to be effectove communicators. whi
Len [333]
Effective not effectove. These are guidelines:
Be brief.
Have a short opening sentence or paragraph that puts the matter in context.
Use the middle paragraph(s) to cover the matter(s) in hand.
Close with a clear agreement of what will be done, by whom, and by when.
7 0
3 years ago
A strong example of using keywords would be a. Using “good” to remember the word “hideous” c. Both of these b. Using “hide” to r
posledela

The answer to the question you have asked is <u><em>"B" . </em></u> Because if you really think about it, there is no possible way that "Good" can be a keyword of "Hideous".

6 0
3 years ago
Other questions:
  • A disadvantage of ethernet??
    6·1 answer
  • What system of representation is used for the threaded portions
    12·1 answer
  • #Write a function called "replace_all" that accepts three #arguments: # # - target_string, a string in which to search. # - find
    11·1 answer
  • Defeating authentication follows the method–opportunity–motive paradigm.
    5·1 answer
  • Where Can you find 2tickets Universal Studios Horror night
    10·2 answers
  • Write a function, named "wait_die_scheduler" that takes a list of actions, and returns a list of actions according to the follow
    11·1 answer
  • 4.12 LAB: Using math methods Given three floating-point numbers x, y, and z, output x to the power of z, x to the power of (y to
    10·1 answer
  • Coding 5 - Classes The Item class is defined for you. See the bottom of the file to see how we will run the code. Define a class
    13·1 answer
  • Write a function max_magnitude() with two integer input parameters that returns the largest magnitude value. Use the function in
    6·1 answer
  • which server edition doesn't support any server roles that you would typically use with standard version
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!