1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anni [7]
3 years ago
6

Hewo everyone look at me I look ugly don't I​

Computers and Technology
2 answers:
aleksley [76]3 years ago
5 0

Answer:

ok then

Explanation:

Gwar [14]3 years ago
4 0

Answer:

Na, you look stunning...!!!! UwU

You might be interested in
The ________ identifies staff reaction and response times as well as inefficiencies or previously unidentified vulnerabilities.
Paraphin [41]

Answer:

simulation test

Explanation:

7 0
3 years ago
Dogs are great pets for families because they teach children many important life lessons. (2) A dog must be walked and fed at ce
PIT_PIT [208]

The answer is A on edge. A)Just like homework and other activities, helping to take care of a dog teaches a child about responsibility.

4 0
3 years ago
Read 2 more answers
A real estate office handles 50 apartment units. When the rent is $600 per month, all the units are occupied. However, for each
Vesnalui [34]

Answer:

452

Explanation:

7 0
3 years ago
What help the ict in your life?and write own idea three or four sentence
My name is Ann [436]

Answer:

I am a software engineering student

computers have createed an impact in my life because through computers i work, I do research and many more

7 0
3 years ago
Which of the following attacks is MOST likely the cause when a user attempts to go to a website and notices the URL has changed?
lilavasa [31]

Answer: C) DNS poisoning

Explanation: DNS poisoning or DNS cache poisoning is the type of attacking tendency towards the URL of the computer. These attempt to attack the URL using the spam mails and the user usually end up clicking on the URL provided by the attacker which invokes attack in the computer.

This mechanism takes place in the emails as well as the selected websites which can be accessed by the users easily.These attacks once enter the system seems like the real thing and become prone to many risks .

6 0
3 years ago
Other questions:
  • Define the method object inc_num_kids() for personinfo. inc_num_kids increments the member data num_kids. sample output for the
    11·1 answer
  • What helped Taylor through her tough time with being bullied
    7·1 answer
  • Blank includes websites that encourage interaction and connection among people businesses and organizations
    14·2 answers
  • We can include following item(s) during configuration itemidentification:
    10·1 answer
  • How to do this PLEASE HELP 80 points!
    15·1 answer
  • Lee has changed the style of his table to make the header row stand out. Next, he wants to center the text in the header row and
    11·2 answers
  • Where can formatting features be found ?! Need help asp !‍♀️
    9·1 answer
  • Which of the following boxes should replace question mark
    8·1 answer
  • LIST THE 7 BEST COMPUTER SCIENCE MOVIES.
    9·1 answer
  • Question 2 of 10
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!