1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
3 years ago
13

Why am I constantly getting bombarded with brainly plus ads and how to fix this without paying for it?

Computers and Technology
2 answers:
Helga [31]3 years ago
8 0

Answer:

there really is no way to fix it. I've tried everything everybody says sorry

Alexus [3.1K]3 years ago
4 0

Answer:

oop

Explanation:

You might be interested in
A network administrator is configuring an ACL with the command access-list 10 permit 172.16.32.0 0.0.15.255. Which IPv4 address
lord [1]

Answer:

For this wild card mask 0.0.15.255 the ACE IP address will be 172.16.47.254

Explanation:

ACL is the access control list that is used to enlist the ip addresses that allowed or restricted to access the network. ACE is an IP address from the list ACL that has all rules and regulations related to access of network. The ACE could be in the range of IP address in ACL. ACL can be calculated with the help of initial IP address adding with wild card mask.

So

Initial IP address is = 172.16.32.0

Wild card mask =0.0.15.255

by adding above values we can find the last IP address of ACL.

after addition

Final IP address is = 172.16.47.255

The options that are available with question, Only option between the range is  172.16.47.254. So we can say that This is the only ACE IP address in options.

7 0
3 years ago
The function known as "Comments" can be displayed during a presentation<br>O True<br>False​
Sonja [21]

Answer:

false

Explanation:

Select the comment icon. on the slide. The Comments pane will open and you can see comments for that slide.

Select Reply to respond to a comment.

Select the Next or Back buttons to go between comments and slides.

3 0
4 years ago
Read 2 more answers
Finally, Su uses the last slide of her presentation as a summary slide. She wants to make sure the text she types automatically
Alex777 [14]

Answer:

Format Shape pane

Text Options

Shrink text on overflow

Explanation:

6 0
4 years ago
Read 2 more answers
How does climate research depend on digital technology
vodomira [7]
Together We Can Create Digital Systems That Provide Scale, Speed & Enable GrowthCohesive Digital Strategy · Secure IT Infrastructure · Secure Digital Foundation · New Digital EconomyTypes: Digital Business, Digital Operations, Digital Systems, Digital Technology<span>Digital Systems & TechDigital OperationsDigital Business<span>Latest Thinking</span></span>
8 0
3 years ago
Discuss the relationship amongst the following basic file elements: • Field. • Record. • File. • Database. • Directory.​
Gwar [14]

Answer:

describe two events from the life of the prophet that illustrate the way he treated non muslims3+15-75+375.

Explanation:

53+15-75+3756,1803+15-75+375describe two events from the life of the prophet that illustrate the way he treated non muslims

4 0
2 years ago
Other questions:
  • Designing the moving parts of a car—including the engine, drivetrain, steering, and brakes—is done by what type of engineer?
    11·2 answers
  • Which language is the most popular language for writing apple os x?
    9·1 answer
  • Which option is most likely used to create many-to-many relationships in Access?
    8·1 answer
  • What are the modes of operation of WLANs?
    5·1 answer
  • NAND is logically complete. Use only NAND gates to constructgate-level circuits that compute the
    7·1 answer
  • Last week, a disk containing CSM Tech Publishing’s current project manuscripts crashed. Fortunately, there was a backup, but all
    15·1 answer
  • Write a code that takes numbers from the user as a list. (User can enter as many numbers as he wants). Then, find mean and stand
    15·1 answer
  • Write a procedure named Read10 that reads exactly ten characters from standard input into an array of BYTE named myString. Use t
    15·1 answer
  • How should you schedule a meeting with someone in another time zone?
    7·1 answer
  • Which of the following is NOT a best practice to protect data on your mobile computing device?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!