1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
3 years ago
8

look at sum of my horrible drawings lol these were last year XD let meh see sum of yalls art!! im not into drawing as much but i

like gaming so i'll show u a dif day of my fortnite drawings :) i think they look better

Computers and Technology
1 answer:
Snowcat [4.5K]3 years ago
5 0

Answer:

Explanation:

but i drew eyes like your but digtal

You might be interested in
Conceptual note-taking is the act of writing down information in the order it is given. drawing attention to details with a mark
Dvinal [7]

Answer:A

Explanation:Conceptual notetaking is the act of writing down information in the order it is given.

4 0
3 years ago
Read 2 more answers
You have an Active Directory forest of two trees and eight domains. You haven’t changed any of the operations master domain cont
Vikentia [17]

Answer:

Option C is the correct option.

Explanation:

The following option is correct because the user has two trees and also has eight domains of the Active Directory Forest and the user not done any alteration on the operations of the master domain controllers then, the schema master is on the 1st domain controller that is in forest root domain controller.

8 0
3 years ago
Examples of mobile device synchronization methods for apple ios devices include:__________
vodka [1.7K]
Answer: iTunes and iCloud
Explanation: These 2 synchronization Apple devices use.
3 0
1 year ago
What is the danger of open-source software when it comes to military robotics?
Murljashka [212]

Answer:

The issue with open source software is that it is usable (and editable) by anyone. When it comes to military robotics, the software that is used to run the robots must remain confidential. If it is not, anyone could take the software that the military is using to make their robots function and replicate it, which could be extremely dangerous.

Explanation:

Open source software is available to the general public.

Feel free to copy and paste this or put it into your own wording. Have a nice day!

4 0
3 years ago
When packets are routed on the Internet, the route for a particular packet is not pre-
Ivanshal [37]

Answer:

She notices the website is using a different font and logo, and that the emails are suspiciously worded:

Explanation:

8 0
2 years ago
Other questions:
  • Good participation in music is strictly limited to those who perform well. true or false
    13·2 answers
  • A hard disk has four surfaces (that's top and bottom of two platters). Each track has 2,048 sectors and there are 131,072 (217)
    11·1 answer
  • Explain briefly why every person in the world is not connected to the Internet.
    9·1 answer
  • John has had a message pop-up on his computer asking him to pay $800 to have his files
    10·2 answers
  • Find the root using bisection method with initials 1 and 2 for function 0.005(e^(2x))cos(x) in matlab and error 1e-10?
    8·1 answer
  • A sosit vara.copiii sunt veseli pentru ca au luat vacanta,mii de fluturi colorati zboara pe ceruri senine,soarele straluceste ve
    6·1 answer
  • The first step in planning effective writing is to consider the _____. Audience Style Purpose Main Idea
    15·1 answer
  • A system analyst generally needs to have a number of skills. For example, technical and analytical skills are required for this
    7·1 answer
  • A computing company is running a set of processes every day. Each process has its own start time and finish time, during which i
    11·1 answer
  • Activity #2
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!