1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rjkz [21]
2 years ago
14

Who do you guys ship lol bit with?

Computers and Technology
2 answers:
LekaFEV [45]2 years ago
8 0

Answer:

nobody

Explanation:

Daniel [21]2 years ago
3 0
I don't know who bit but I like shipping Gogy and Dream
You might be interested in
Write a logical expression using only and, or and not that is equivalent to the Exclusive NOR (XNOR) gate on 2 inputs, called in
denis-greek [22]

Answer:

in1 = int(input("Enter value one: "))

in2 = int(input("Enter value two: "))

print(in1,type(in1), in2, type(in2))

if (in1 <=0 and in2 <=0) or (not in1 <=0 and not in2<=0):

   print( True)

else:

   print( False)

Explanation:

The if statement of the python source code is used to implement an Exclusive-NOR logic gate that gives a true or high value if both inputs are either true or false.

5 0
3 years ago
When you use the ip address of the web server, the correct site is displayed?
jekas [21]
No. Using the address will get you either the default site, or the first site declared. Web servers can host VirtualHosts, and rely on the site name to know which VirtualHost to serve. TMI, it's called name based virtual host, as opposed to the machine having many addresses then address based virtual hosts can be created.
6 0
3 years ago
Select the correct answer.
Gnesinka [82]

Answer:

D.

Explanation:

I think.

4 0
1 year ago
One shortcoming of rapid application development (RAD) is _____.
VladimirAG [237]
One shortcoming of rapid application development (RAD) is a narrow focus, which might limit future development.
8 0
2 years ago
What is the maximum number of elements that will be visited by the binary search algorithm when searching a sorted 45-element ar
sergey [27]

The max nukber of elements visited will be 6.

6 0
1 year ago
Other questions:
  • What is the software called that allows the user to create, access, and manage a database? question 8 options:
    10·1 answer
  • ?the single most effective security measure for digital devices is to password protect access to them.
    5·1 answer
  • On computer X, a nonpipelined instruction execution would require 12 ns. A pipelined implementation uses 6 equal-length stages o
    9·1 answer
  • What is the decimal value of 00001111
    14·1 answer
  • What is computer sences​
    6·1 answer
  • What do computer programs generally try to solve and how? A) Computer programs generally try to solve a well-defined problem usi
    14·1 answer
  • Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a p
    14·1 answer
  • WILL GIVE BRAINLIEST!!!!!
    8·1 answer
  • 2ND LAST QUESTION
    13·1 answer
  • What is control structure write it's types​ .
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!