1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11Alexandr11 [23.1K]
3 years ago
8

Who has gotten a random file link from someone? What file does it contain?

Computers and Technology
2 answers:
Bad White [126]3 years ago
8 0

Answer:

those are bots , just report those

Explanation:

dalvyx [7]3 years ago
8 0
I got it but I didn’t download it cuz it looks sketchy he literally posted that same link to everyone who has made a question so I would advise not to download it
You might be interested in
A digital forensic analyst examines the original digital source (e.g. computer, flash drive, backup tape) suspected of being inv
mel-nik [20]

Answer: True

Explanation:

Digital forensic analysts are the people who examine digital devices such as cameras, mobile phones and computers in order to get evidence of crime.

The evidence gotten by them can then be used to provide support to criminal investigations and can also be given to the intelligence agencies. Their function is to get back and safeguard the digital data which are related to cybercrime investigations as well as criminal investigations.

6 0
3 years ago
How to write this program , please ?​
sleet_krkn [62]

Answer:

010101010101

Explanation:

Ao código binario

6 0
3 years ago
If you double the force of and object what happens to the acceleration
Vera_Pavlovna [14]

Answer:

As we increase the force on an object the acceleration increases proportionally. Since the mass does not change as the acceleration increases, we can say that force is equal to acceleration

7 0
3 years ago
What language(s) MUST be used to display a bare-minimum web page?
gogolik [260]
By using HTML. Hopefully thats the answer you are looking for :)
5 0
3 years ago
Read 2 more answers
Hey! PLEASE HELP!!!
Solnce55 [7]

Answer:

change your computer date/skip the videos

Explanation:

hi there!  i've been using brainly for free for some time and found that there a few ways to bypass some of their free member restrictions.

first off, there's really not an easy way to skip the video, unless you want to get technical.  however, i've found that you can drag on the grey video bar on the bottom of the ad to skip to the very end, thus getting you the answer you need very quickly!

also, brainly has a 7 day answer restriction in place, which you can easily bypass by changing the date on your computer!  an easy way to do that is to hit the Windows key and type "date", after which a setting will pop up that reads "Date & time settings".  click on that or hit enter. then, tick off the slider that says "Set time automatically", and go down to "Set the date and time manually", after which you'll hit "Change" and change the day to a couple days in the future.  give it a second, refresh the brainly tab or re-search up your answer, and you should get a lot more daily answers!  one thing i must say about this method is that your computer's date will no longer be accurate. to fix this, you'll have to re-tick the slider that reads "Set time automatically", and it should fix your clock.

one more thing is that, instead of sending your parent an email, you can try to send yourself that email! unless it's an advertisement for buying brainly premium, there also should be no reason to even send the email in the first place, so try to bypass that when you can.

i hope this helps you!

4 0
3 years ago
Other questions:
  • Alison retrieved data from a company database containing personal information on customers. When she looks at the SSN field, she
    14·1 answer
  • A usability study compares the number of page visits on a web site. Half of the participants saw Version A of the home page. The
    13·1 answer
  • What can be designed to create annoying glitches or destroy data
    15·2 answers
  • Enumeration is defined as the process of extracting user names, machine names, network resources, shares, and services from a sy
    13·1 answer
  • Take the template and complete creation and ordering of the Triangular Matrix. //Complete the following Functions int**fillAry(i
    7·1 answer
  • Ria and her team ....................... they will win. *
    8·1 answer
  • David wanted to build a Temple for God in________
    10·2 answers
  • SimpleScalar is an architectural simulator which enables a study of how different pro-cessor and memory system parameters affect
    6·1 answer
  • 1. Give one reason why data is represented in binary in a computer [1]
    10·1 answer
  • A common attack in which a client's cookies, security tokens, or other personal information is obtained and used to impersonate
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!