1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mice21 [21]
2 years ago
15

I just downloaded this song and if any one wants to listen to it then go ahead and do that. It’s called Trap Music 2018 âa bass

boosted trap mix.
Computers and Technology
2 answers:
xz_007 [3.2K]2 years ago
4 0

Answer:

ok

Explanation:

julsineya [31]2 years ago
4 0

Answer:

i know that one fire

Explanation:

You might be interested in
To edit the text in a smartart graphic, what must be done first ?
ICE Princess25 [194]
C Hope this helps :D
8 0
2 years ago
Read 2 more answers
J=2
leonid [27]

Answer:

yup

tthast right

Explanation:

5 0
2 years ago
Power point how to insert diamond symbol
IceJOKER [234]
You got to "insert" and then you go to "shapes" and then you find the symbol you like and you drag and drop it onto the page. Then you can resize to the size and angle you would like it at.
4 0
3 years ago
____ is any technology that aids in gathering information about a person or organization without their knowledge.
DanielleElmas [232]

Answer:

Spyware

Explanation:

In most cases, a spywares are unwanted software enters into your computer or other devices and steal sensitive information, your internet usage data, and other information. Spyware is considered a malware type and a malicious one that is aimed at damaging a device or gaining control and access without the knowledge of the owner.

4 0
3 years ago
After a security incident is verified in a SOC, an incident responder reviews the incident but cannot identify the source of the
oksian1 [2.3K]

Answer:

Option A i.e., SME for further investigation.

Explanation:

Following the reports of such a security incident into an SOC, an incident respondent examines the incident but could not determine the cause of that same incident as well as establish an appropriate response protocol. The ticket for an incident must be applied to SME for even more inquiry. So, the following answer is correct.

5 0
3 years ago
Other questions:
  • 3. If B3=6 and D5=8, what would the following function return? IF(B3>D5, "Closed", D5-B3) *
    10·2 answers
  • Analyze the following code. II: public class Test { public static void main(String[] args) { System.out.println("Welcome to Java
    11·1 answer
  • What are examples of some Exotic currencies?
    14·1 answer
  • What is the command to create a compressed archive(archive1.tar.gz) of files test1 test2and test3.
    5·1 answer
  • A class is a _____, which encapsulates _____ and _____. (Points : 2) programming language construct; attributes; behavior
    7·1 answer
  • Write a program that rolls two dice until the user gets snake eyes. You should use a loop and a half to do this. Each round you
    10·1 answer
  • How did the use of ARPANET change computing?
    14·1 answer
  • If you have limited means, you...?
    9·1 answer
  • In QBasic, create a number guessing challenge. Your program should generate a random number from 1-
    9·1 answer
  • Elan inserted shapes into a slide in his presentation. What is the quickest way to format those shapes?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!