1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
den301095 [7]
3 years ago
13

Friday Night Funkin Fans, does this count as a leak if I share it?

Computers and Technology
2 answers:
Aliun [14]3 years ago
7 0
Hmm no I don’t think so
asambeis [7]3 years ago
3 0

Answer:

Nah I doubt it

Explanation:

You might be interested in
How to delete audio from powerpoint​
Marta_Voda [28]

Answer:

To delete an audio clip, select the audio icon on the slide and press Delete.

Hope it helps!!!!

4 0
3 years ago
Rocks created from compaction and cementation of sediments are called:
Effectus [21]

Answer:

Sedimentary Rocks

Explanation:

Sedimentary rocks are essentially the Frankenstein monsters of the rock world. They're made up of pieces of igneous and metamorphic rocks, sand, clay, and other sedimentary rocks.

4 0
3 years ago
Consists of a variety of circuitry and components that are packaged together and connected directly to the motherboard. it perfo
Goshia [24]
This is true because the motherboard is the main holder of all the operation and connection of all the system.
3 0
3 years ago
True or false: all blockchains are programmed to have the same block time (confirmation time) as each other.
wariber [46]

Answer:

False

Explanation:

<em>The complexity of the hash, which is the hexadecimal number produced by the hashing process, determines the precise length of time required for block production. Thus, block times won't always be the same.</em>

4 0
2 years ago
Create a function, return type: char parameters: int *, int * Inside the function, ask for two integers. Set the user responses
iris [78.8K]

Answer and Explanation:

In C programming language:

char fun(int*a, int*b){

printf("enter two integers: ");

scanf("%d%d",a,b);

int e;

printf("please enter a character: ");

e=getchar();

return e;

}

int main(int argc, char *argv[]) {

int d;

int f;

int g;

fun();

printf("%d%d%d", d, f, g);

}

We have declared a function fun type char above and called it in main. Note how he use the getchar function in c which reads the next available character(after the user inputs with printf()) and returns it as an integer. We then return the variable e holding the integer value as char fun() return value.

4 0
3 years ago
Other questions:
  • A skier provides what in a landscape photograph of a mountain?
    14·2 answers
  • Complete the following:_____
    9·1 answer
  • Write a program that prints the number 1 through 10 using a while loop
    6·1 answer
  • In Excel, what happens to the cell contents when you click and drag a cell into multiple cells?
    14·1 answer
  • What part of the communication feedback loop results in unclear communication?
    13·1 answer
  • Which of the following best define grit
    13·1 answer
  • Click to visit W3Schools.com
    14·2 answers
  • What happens to a message when it is deleted?
    5·2 answers
  • Discuss TWO changes in ICMP that took place with the development of IPV6 and indicate why those changes were made.
    7·1 answer
  • When using the Photo Album dialog box, a picture
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!