1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
9966 [12]
3 years ago
6

Just letting all my friends know, i am deleting this account and making a new one same username and profile picture so you know

it is me. the reason why i have to do this is because of a bully who keeps threating me, is call Jacob, aka Deathbed14, please do not worry, my parents know and the police is sorting him out.
Computers and Technology
2 answers:
ki77a [65]3 years ago
3 0

Answer:

Explanation:

OK good luck

ExtremeBDS [4]3 years ago
3 0

◦•●◉✿Good luck siso be happy and don't worry ◦•●◉✿they will caught up by police✿◉●•◦✿◉●•◦

You might be interested in
You may declare an unlimited number of variables in a statement as long as the variables are ____.
k0ka [10]

Answer:

b. the same data type

Explanation:

Any number of variables can be declared in a statement as long as the variables have the same data type. For example:

1) int a,b,c,d,e;

Here each of the declared variables a,b,c,d,e have the type int.

2) char p,q,r,s,t,u,v,w;

In this case variables p to w all have the type char.

3) float x,y,z;

x,y and z are all of type float.

6 0
4 years ago
I am currently building my own PC is there any part I should put first? Or is it just whatever?
Dominik [7]

Basically, I had the same question when I got my PC! You can do any part you choose as long as you put it together in the right place.

Hope this helped you!

4 0
3 years ago
Read 2 more answers
What is the smallest unit of measure on the computer
Sauron [17]
The smallest unit of measure is a “Bit” or a Binary Digit. Glad to help!
4 0
4 years ago
An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data i
tatiyna

Answer:

Nfc relay attack

Explanation:

The NFC relay attack occurs when data is extracted by an attacker who puts himself in the middle of two parties having a communication with each other. As the message gets to a party, the attacker gets it and modifies it to their taste then passes it on.

This attacker in this question is extracting data by establishing communication between end user devices and reader in the kiosk

5 0
3 years ago
Write an assembly program to find the largest item in an array and store it in a variable named MAXIMUM. Hint: Use both Jump and
Gekata [30.6K]

Use the knowledge of computational language in C++ to write the a code assembly program to find the largest item.

<h3>How to write a maximum function in C++?</h3>

To make it simpler the code is described as:

<em>#include<bitd/stdc++.h></em>

<em>Using namespace std;</em>

<em>Int main(){</em>

<em>Int arr[10]={10, 2, 23, 45, 21, 11};</em>

<em>Int min=INT_MAX;</em>

<em>Int max=INT_MIN;</em>

<em>for(int i=0;i<10;i++)</em>

<em>If(min<arr[i])min=arr[i];</em>

<em>for(int j=0;j<10;j++)</em>

<em>if(max>arr[j])max=arr[j];</em>

<em>Cout<<max<<” “<<min<<endl;</em>

<em>return 0;</em>

See more about C++ code at brainly.com/question/19705654

7 0
2 years ago
Other questions:
  • You want to multiply 50 in cell D3 by 8.90 in cell E3. Which formula should you use?
    11·1 answer
  • Piers wants to take a course on XML. He is a certified web designer, but he has not used XML before. How can he use XML to impro
    6·1 answer
  • The Mail Merge option is located in which tab? a;home b;insert c;refernces d;mailings
    11·2 answers
  • If you want to code a method that can only be called from the class that the method is in, you code ____________________ as the
    15·2 answers
  • Give two reasons you should be aware of your computer's system components and their characteristics.
    10·1 answer
  • Which of the following networks had these two goals: a) allowing scientists to work together on scientific projects; and, b) fun
    8·2 answers
  • What percentage of teens say they have witnessed cyberbullying?
    6·2 answers
  • Imaging a computer is part of what phase of conversion?
    14·1 answer
  • What are software applications?
    14·1 answer
  • Fill in the blank: A keyword set to _____ match type will display your ad if the search term contains the same order of the word
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!