1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ludmilka [50]
3 years ago
11

can somebody please explain to me why I woke up today to see that all of my 40 answers where deleted ? like what I spent hours

Computers and Technology
2 answers:
Basile [38]3 years ago
7 0

because of answer correcter.

Alina [70]3 years ago
4 0
Same on my other account
They took my brainly and my answrs
Left me with thanks and a lil point
What going on???
You might be interested in
Write a program that accepts a whole number as
SashulF [63]

This is for Python

number = int(input('Number: '))

number = number * 12

print(number)

3 0
3 years ago
What will be the output of the following query on the table below?
shtirl [24]

Answer:

b

Explanation:

7 0
3 years ago
Read 2 more answers
You plan to use the Fill Down feature on a formula and you need to keep a cell reference the same. Which of the following format
yKpoI14uk [10]
A $E19 I now it because I am in college
6 0
3 years ago
Read 2 more answers
What are two key elements of describing the environment?​ a. ​ Communication protocols and security methods b. ​ External system
pashok25 [27]

Answer:

B. External systems and technology architecture.

Explanation:

In such environment, you have to know what external systems are in place so have proper communication with External Systems whether be in message format or web/networks, Communication protocols, Security methods, Error detection and recovery,

Additionally, it consits of technology architecture so conforming to an existing technology architecture helps us discover and describe existing architecture

3 0
3 years ago
Which of the following is a best practice regarding the Administrator account?
lara31 [8.8K]

Answer:

B. The account should be given a nondescript account name that cannot be easily guessed.

3 0
3 years ago
Other questions:
  • A downloaded executable file may contain harmful software known as
    13·2 answers
  • Which type of communication protocol converts data into standard formats that can be used by applications?
    11·1 answer
  • Consider the following code segment.
    15·1 answer
  • Drugs of addiction act upon a portion of the Brain called the lambic system ? True or false.
    7·1 answer
  • Every call to a recursive function has its own code and its own set of ____ and local variables
    5·1 answer
  • Which of these is a valid use of the Reply All feature?
    11·1 answer
  • What has impacted the world more: The initial creation of telephone or a smart cellphone? Explain your reasoning!
    6·1 answer
  • The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to pr
    13·2 answers
  • Write a description of the photograph to someone who cannot see the photograph. Be sure to include the title of the photograph a
    5·1 answer
  • Windows is a GUI Operating System, what is the other type?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!