1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesnalui [34]
3 years ago
14

My feelings alwayss T-T

Computers and Technology
2 answers:
ddd [48]3 years ago
8 0

Answer:

my feelings always :/

Explanation:

Montano1993 [528]3 years ago
3 0
It’s ight brodie:)))
You might be interested in
question 2 what are some types of software that you'd want to have an explicit application policy for? check all that apply.
zaharov [31]

The types of software that you'd want to have an explicit application policy are:

  • Filesharing software
  • video games

  • Explicit application policy are simply refered to as legal rights that are stated regarding ownership or company. It is actual substance of an agreement

  • Video games and filesharing software is of not really important in som business. So therefore, having explicit policies showing why or not this type of software is permitted on systems is okay.

Conclusively, we can say that Filesharing software and video games can require an explicit application policy.

Learn more from

brainly.com/question/12730075

4 0
3 years ago
Get the user to enter some text and print it out in reverse order.
svetlana [45]

Answer:

strrev in c/c++

Explanation:

3 0
2 years ago
I need help plzzzzzzz
Aleonysh [2.5K]

By looking at your code, it seems like you're trying to let the user enter positive numbers until the user enters a negative number. To achieve this, you need to indent int(input("Enter a number, negative to stop")) inside the loop.

The second answer choice is correct.

3 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
Pie

Answer:

Eveidence

Explanation:

<3

7 0
3 years ago
Read 2 more answers
What is token passing?
Flauer [41]

Answer:

Answer is A network access method that avoids the possibility of data collisions.

Token Ring is the precursor to Ethernet and CSMA/CD to avoid packet collisions.

Explanation:

8 0
4 years ago
Other questions:
  • What are the six critical components of an information system? Select three of the six components, and describe a potential vuln
    15·1 answer
  • Can a computer will work more efficiently if you perform disk optimization
    9·1 answer
  • Write the sql command to show which tutor needs to be reminded to turn in reports.
    13·1 answer
  • Explain the saying "Dress for the position you want, not the position you have."
    6·2 answers
  • Grandma Ester normally gives you hugs for your birthday - one for every year old you are. When you turned 15, she squished you w
    8·1 answer
  • Demand is created through meeting customer buying criteria, credit terms, awareness (promotion) and accessibility (distribution)
    10·1 answer
  • Write a program that accepts a time as an hour and minute. Add 15 minutes to the time
    14·1 answer
  • Hypercompetition implies that any architecture must be designed with maximum flexibility and _____ to ensure it can handle the i
    6·1 answer
  • Where is the flash drive listed in a windows 7 save as dialog box?
    9·1 answer
  • The primary source of help for technical problems with BC Online (computer settings, password, etc.) is:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!