1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Advocard [28]
3 years ago
11

Code: ckg-jbqp-hkionly girls join❤️​

Computers and Technology
2 answers:
tangare [24]3 years ago
4 0
What code This is an app for helping pepole so please text people private
Leokris [45]3 years ago
3 0

Answer:

Trjtj1j2ybwynwhnhwnwtnwynwynhw

You might be interested in
How do you screen shot and copy paste the screenshot from chrome book
Black_prince [1.1K]
Hit the window key + ctrl. You than find the screenshot in your downloads. You click on it and it will say copy. Press it and paste your image where you need to post it on. That’s how you do it!
5 0
3 years ago
Read 2 more answers
BitTorrent, a P2P protocol for file distribution, depends on a centralized resource allocation mechanism through which peers are
ch4aika [34]

Answer:

yes. it is true. mark as brainlest

8 0
2 years ago
Adjusting the ______ adjusts the difference in appearance between light and dark areas of the photo.​
Svetach [21]

Answer:

contrast

Explanation:

4 0
3 years ago
Read 2 more answers
The most likely reason that company computers connected to the Internet should use anti-virus protection software is..?
gogolik [260]
A big/potent virus could eliminate economic statuses/money, maybe bankrupting the company. 
4 0
3 years ago
Which of the following is true of how packets are sent through the internet?
horrorfan [7]

Answer:

It is A: Packet metadata is used to route and reassemble information travelling  through the internet.

Explanation:

Step 1: The Internet works by chopping data into chunks called packets. Each packet then moves through the network in a series of hops. Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee

Step 2: Entering the network

Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee.

Step 3: Taking flight

The next hop delivers the packet to a long-haul provider, one of the airlines of cyberspace that quickly carrying data across the world.

Step 4: BGP

These providers use the Border Gateway Protocol to find a route across the many individual networks that together form the Internet.

Step 5: Finding a route

This journey often takes several more hops, which are plotted out one by one as the data packet moves across the Internet.

Step 6: Bad information

For the system to work properly, the BGP information shared among routers cannot contain lies or errors that might cause a packet to go off track – or get lost altogether.

Last step: Arrival

The final hop takes a packet to the recipient, which reassembles all of the packets into a coherent message. A separate message goes back through the network confirming successful delivery.

3 0
3 years ago
Read 2 more answers
Other questions:
  • To add and remove chart elements, you can use the add chart element button in the charts layout group on the ____ tab.
    6·1 answer
  • Two different names that refer to the same data item best defines:
    12·1 answer
  • Processing is handled by the computer’s central processing unit (cpu).​ <br> a. True <br> b. False
    6·1 answer
  • Computer Architecture
    7·1 answer
  • Decision making at the executive or strategic level requires business intelligence and knowledge to support the uncertainty and
    12·1 answer
  • 19 dollar fortnite giftcard who wants it
    15·2 answers
  • Exercise 3.6.9: 24 vs. "24"5 points
    7·1 answer
  • Xercise 1<br>1.<br>What is system? Explain the components of system in brief.​
    12·1 answer
  • Anyone here play osu! ?
    11·2 answers
  • Consider the following code:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!