1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Papessa [141]
3 years ago
7

Does anybody play nitro type

Computers and Technology
2 answers:
lora16 [44]3 years ago
6 0

Answer:

I also used to play nitro type but not any more.

Explanation:

vlabodo [156]3 years ago
3 0

Answer: Nah

Explanation: it kinda sucks and is a waste of time, play better games lol

You might be interested in
Write a note on secondary storage​
12345 [234]
Secondary storage refers to storage devices and media that are not constantly accessible by a computer system. Examples include external hard drives, portable flash drives, CDs, and DVDs.
good luck
4 0
4 years ago
. Evan is creating a worksheet and needs to copy information in cells A2:A13 into cells B2:B13. Which of the following is the ea
Fantom [35]
Highlight A2 and drag down and select the cells to A13. Then do ctrl+c to copy.
Next Highlight the cell B2 and then do ctrl+v. This will paste all the cells 
4 0
3 years ago
Alarm filtering may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other
dezoksy [38]

Answer: False

Explanation:

 The given statement is false, as the alarm filtering is the process of classifying the various type of IDPS alert in the system and it can be managed more efficiently.

The IDPS administrator can easily set an alarm filtering in the running system. It can generate the various types of positive tract in the system and then adjust the different alarm classifications. Alarm filters are same as the packet filter in which they can easily filter the items from the source and destination IP address.

3 0
3 years ago
Care sunt avantajele fișierelor de tip ".pdf" ?
Alex787 [66]

Answer:

english i speak .

Explanation:

7 0
3 years ago
Read 2 more answers
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions
docker41 [41]

Answer:

Codes of conduct

Explanation:

Codes of conduct are a set of rules or norms established by an organization for all employees, students or users, to ensure individual responsibilities and proper practices. The code of conduct can cover overall behaviour of individuals in an organization, but a specific code of conduct can be developed for proper computer use in order to establish what is appropriate and available to use in the organization´s computers, and also to restrict or avoid non related content.

7 0
3 years ago
Read 2 more answers
Other questions:
  • When registering a new domain name, either the registrar's servers or self-owned servers can be used as name servers. What funct
    15·1 answer
  • Describe a new career in computer science that may be created in the future. Include supporting evidence in your response that s
    13·1 answer
  • Describe conductors and insulators in terms of energy
    11·1 answer
  • Create a Python script that takes two parameters to do the following:-
    9·1 answer
  • A computer consists of both software and hardware. a)Define the term software​
    5·1 answer
  • Please tell fast plzzzzzzzz​
    11·2 answers
  • Write your question here (Keep it clear and simple to get the best answer)
    13·2 answers
  • Jacob was sitting in class. His teacher understands that he is the type of student that doesn't comprehend when he sees or hears
    6·1 answer
  • From few sometime I am unable to answer any question. Whenever I am clicking on Answer button it is taking me to logging page. B
    15·1 answer
  • Explain why people struggle to control themselves when they engage with social media
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!