1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leni [432]
3 years ago
6

So girls i need advice i got a girliend and shes like awesome nice sweet and i need advice what to say or nice things girls like

to talk ab?
Computers and Technology
2 answers:
Charra [1.4K]3 years ago
6 0

Answer:

talk about her hobbies

Explanation:

Mila [183]3 years ago
4 0
Try getting to know her or ask her about stuff she enjoys doing or hobbies she likes
You might be interested in
Suppose that the following elements are added in the specified order to an empty binary search tree: Kirk, Spock, Scotty, McCoy,
patriot [66]

Answer:

Pre-order: Kirk, Chekov, Khaaaan, Spock, Scotty, McCoy, Sulu, Uhuru

In-order: Chekov, Khaaaan, Kirk, McCoy, Scotty, Spock, Sulu, Uhuru

Post-order: Khaaaan, Chekov, McCoy, Scotty, Sulu, Uhuru, Spock, Kirk

Explanation:

The binary search tree is described in the diagram below.

The pre-order traversal of the binary tree gets the root, then the left node and right node. The in-order traversal picks the left node, the root node, and then the right node while the post-order traversal of the binary tree follows the left node, right node, and then the root node.

6 0
3 years ago
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of
notka56 [123]

Answer:

The answer is "compromise"

Explanation:

In computer science, the comprised system is used to describe as any technological resource, that has been negatively affected by an untrustworthy source for nondisclosure, integrity or accessibility either deliberately or inadvertently.

  • In this, the mechanical interaction from the unauthorized source or technological progress can result in compromise.
  • This helps you and the partner to meet each other's interests by taking into consideration both the positions and the solution to the main problem.

4 0
3 years ago
Read 2 more answers
​Which SQL keyword is used to search for records?
Over [174]
SQL (<span>Structured Query Language.) is the standard programming language for communicating and organizing databases (DB).
In order to search through the database the statement SELECT should be used.
SELECT select data from the database.
SELECT is followed by the statement FROM which defines from which database you search record. </span>
8 0
4 years ago
What steps should be taken to dispose of and recycle plastic?
WARRIOR [948]
Step 1: Collection. The first step in the recycling process is always collecting the plastic material that is to be recycled. ...
Step 2: Sorting. ...
Step 3: Washing. ...
Step 4: Resizing. ...
Step 5: Identification and separation of plastics. ...
Step 6: Compounding.
3 0
3 years ago
The Save command saves your changes silently without additional prompts, using the same save settings; the Save As command reope
kirza4 [7]

The "Save command" saves your changes <u>silently</u> without additional prompts and it uses the same save settings while the "Save As command" <u>reopens</u> the Save screen: True.

What is the Save command?

A Save command can be defined as a type of command associated with the file menu of a software application and it causes a copy of the current file to be created and stored to a specific location on a computer system.

<h3>What is the Save as command?</h3>

A Save command can be defined as a type of command associated with the file menu of a software application and it causes a copy of the current file to be created and stored to a different location, file name, and/or file type.

In conclusion, the "Save command" saves your changes <u>silently</u> without additional prompts and it uses the same save settings while the "Save As command" <u>reopens</u> the Save screen, so as to enable you make different choices.

Read more on Save command here: brainly.com/question/16852455

5 0
3 years ago
Other questions:
  • The network ____, the person overseeing network operations, uses a server operating system to add and remove users, computers, a
    15·1 answer
  • The left column values in a table array are called table ____
    13·1 answer
  • Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha
    7·1 answer
  • The term ________ refers to fluid flow back to the pan to empty or drain a circuit.
    5·1 answer
  • Write a function called first_last that takes a single parameter, seq, a sequence. first_last should return a tuple of length 2,wh
    14·1 answer
  • I know how to design it but I’m confused as to how to write a function code based on the info provided.
    10·1 answer
  • ______involves encoding information using fewer bits than the original representation Group of answer choices
    6·1 answer
  • 1. A database table can hold ??
    9·1 answer
  • What Are the Benefits of Using Leads Automation Tool?
    5·1 answer
  • What constructs break or bend the normal Syntax patterns of scheme?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!