1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balu736 [363]
3 years ago
6

I love my baby boy and can someone help me with this

Computers and Technology
1 answer:
mamaluj [8]3 years ago
8 0
Ice cream sandwich definitely
You might be interested in
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
OLEGan [10]

Answer: Stealth scanning technique

Explanation:

Stealth Scanning technique includes the following steps:

1. The client upon sending a single SYN packet to is responded by SYN/ACK packet if the port is open.

2. The port is assumed to be in closed state if the RST packe t is sent from the server.

3. This RST packet is sent by the client to close the initiation process so that a connection cannot be established.

6 0
3 years ago
The top-down approach is an appropriate strategy for most
puteri [66]

Answer:

true

Explanation:

The Top-down approach is an approach to a problem that focuses on the big picture first before moving down into the specifics of the topic/problem. Therefore based on the information provided within the question it can be said that the statement being made is completely true. Since the interviewer using this approach starts with a broad topic and later goes into the details, it does allow them to be accustomed to the topic first.

8 0
3 years ago
12. In Justify the text is aligned both to the right and to the left margins, adding extra space between words as necessary *
Lena [83]

\blue{

\green{

Answer:

  • False

Explanation:

  • Because, aligment the tex are aligned in the centre of the page.

\pink{

\red{

4 0
3 years ago
Read 2 more answers
Who has a brainpop acct. can i pls use it !
RSB [31]

Answer:

Союз нерушимый республик свободных

Сплотила навеки Великая Русь.

Да здравствует созданный волей народов

Единый, могучий Советский Союз!

Славься, Отечество наше свободное,

Дружбы, народов надежный оплот!

Знамя советское, знамя народное

Пусть от победы, к победе ведет!

Сквозь грозы сияло нам солнце свободы,

И Ленин великий нам путь озарил.

Нас вырастил Сталин - на верность народу

На труд и на подвиги нас вдохновил.

Славься, Отечество чаше свободное,

Счастья народов надежный оплот!

Знамя советское, знамя народное

Пусть от победы к победе ведет!

Skvoz grozy siialo nam solntse svobody,

I Lenin velikij nam put ozaril.

Nas vyrastil Stalin - na vernost narodu

Na trud i na podvigi nas vdokhnovil.

Slavsia, Otechestvo chashe svobodnoe,

Schastia narodov nadezhnyj oplot!

Znamia sovetskoe, znamia narodnoe

Pust ot pobedy k pobede vedet!

Мы армию нашу растили в сраженьях,

Захватчиков подлых с дороги сметем!

Мы в битвах решаем судьбу поколений,

Мы к славе Отчизну свою поведем!

Славься, Отечество наше свободное,

Славы народов надежный оплот!

Знамя советское, знамя народное

Пусть от победы к победе ведет!Explanation:

8 0
3 years ago
Gauthmath https://s.tutorus.xyz/lp/invite?code=GGQGBL​
sammy [17]

Answer:

Umm

Explanation:

3 0
2 years ago
Other questions:
  • Which of the following is the strongest password? Xo795&A &cGo9Tz F5h#3u9g vU7#$3T sC9$d&cF5h#3u9g
    13·2 answers
  • I need the code for Assignment 5 Animation in Edhesive, its in python code.
    9·1 answer
  • If you sort by Last Name, Ascending, which of the following last names would come first in the list?
    12·1 answer
  • Suppose that Alice wants to send Bob a 50 kilobyte message over a 1 Gbps link. The total time required to transmit the message (
    5·1 answer
  • A number of LC-3 instructions have an "evaluate address" step in the instruction cycle, in which a 16-bit address is constructed
    6·1 answer
  • 1. Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bit memory address
    7·1 answer
  • When a person bullies someone using technology, it's called:
    9·2 answers
  • Write a program to read from std_info.txt.
    11·1 answer
  • Shira’s Shoes sold 875,000 pairs of sandals in June, which was 70% of the total number of shoes sold. How many shoes did the com
    14·2 answers
  • Procedural programs specify instructions that a processor must execute to perform computations. These programs sometimes consist
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!