1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ainat [17]
3 years ago
14

I still haven't figured out how to award someone branliest will someone help me? If you explain to me how to do it i will do awa

rd u brainliest.
Computers and Technology
1 answer:
WITCHER [35]3 years ago
8 0

Answer:

Who answered correct is the brainliest and the Person who question once will give the Marks obtaining by the Person who answered correct.

You might be interested in
As we learned in the unit, basic speech is developed during the toddler years. To what extent do you think a toddler’s speech is
lidiya [134]
I'm not a mother, of course, but I have babysat a lot. I have picked up toddlers language being incredibly influenced by their parents. One child's father is very vulgar, and she told me she would "spank a**" me yesterday. Whereas other children, with polite parents, are nothing but nice (unless their parents are strict, which may cause behavioural problems). They adapt to the habits of their parents.
5 0
3 years ago
What is the difference between a pixel pitch and a dot pitch​
BaLLatris [955]

Answer:

is a measurement that defines the sharpness of a display. It measures the distance between the dots used to display the image on the screen. This distance is very small and is typically measured in fractions of millimeters. The smaller the dot pitch, the sharper the picture.

7 0
4 years ago
Read 2 more answers
A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not
Ghella [55]

Answer:

B. NIDS

Explanation:

From the question we are informed about A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. The BEST device to meet these requirements is NIDS. Network intrusion detection system known as "NIDS" can be regarded as a system that can attempt in detection of hacking activities as well as denial of attack on computer network. It can monitor network traffic and can as well detect malicious activities through identification of suspicious patterns in any incoming packet.

3 0
3 years ago
The number of square units required to cover a surface.
dolphi86 [110]
This depends on the length, width, and sometimes height.
5 0
3 years ago
Which part of the water cycle is most affected by a sunny day with few clouds?
nirvana33 [79]
Increase in evaporation
8 0
3 years ago
Read 2 more answers
Other questions:
  • What is the last step when supervising detainee operations ssd1?
    14·1 answer
  • C2.5 - A group of four pirates has a treasure chest and one unique lock and key for each pirate. Using hardware that is probably
    6·1 answer
  • The outstanding disk requests are for tracks 6,10,4,20,36,8, and 40 in that order. Assume that the seek time speed is 5 msec/tra
    14·1 answer
  • How do I write a letter on my computer and print it?
    9·2 answers
  • How does a project manager evaluate the scope of a project?
    14·2 answers
  • Why is flash memory considered nonvolatile?
    5·1 answer
  • A set of parentheses that contain zero or more arguments
    12·1 answer
  • Find the complete predicate in the sentence below.
    6·1 answer
  • TLE(ICT)-10
    10·1 answer
  • Does anybody know how to fix my Minecraft??? My character isn’t loading and realms aren’t working?? Look at the picture!
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!