1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreev551 [17]
3 years ago
11

Anybody wanna play some brawl stars​

Computers and Technology
2 answers:
erik [133]3 years ago
7 0
Wait people still play that?
Trava [24]3 years ago
5 0

Answer:

um i cant dont have it.

Explanation: just dont have it.

You might be interested in
Explain the steps you take when conducting research online to ensure it the source is providing reliable information.
Gala2k [10]

Answer:

Author

Date and

Source

Explanation:

Author – Information on the internet with a listed author is one indication of a credible site. ...

Date – The date of any research information is important, including information found on the Internet. ...

Sources – Credible websites, like books and scholarly articles, should cite the source of the information presented.

5 0
3 years ago
The dashboard for the WebFOCUS BI platform in the Travel and Transport case study required client side software to operate. True
Elina [12.6K]

Answer:

True

Explanation:

The WebFOCUS is a platform with the BI and analytics that can be used as an application tool for business transactions and reports. Different kinds of professionals such as those in management or analysis as well as customers could use the platform. Based on the statement provided in the question, the answer is true.

6 0
4 years ago
A series of events that gets the computer ready for work is known as what?
DedPeter [7]
I think the answer is the third one...
7 0
4 years ago
Read 2 more answers
Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces
Cloud [144]

Watchdog Program

This program becomes the number one security mechanism for file access.

Pros:

  1. A benefit of using watchdog program is that you have a centralized mechanism for controlling access to a file
  2. You are assured of having secure access to your file

Cons:

  1. It becomes a bottleneck.
  2. If this program has a security hole, there are no other guaranteed backup mechanisms for file protection.

COPS

COPS is a collection of a dozen programs that attempt to tackle problems in UNIX security. It checks for a number things like poor passwords, device permissions, files run in /etc/rc*, existence of root SUID, and many other things.

Pros:

  1. This program provides methods of checking for common procedural errors.
  2. COPS collect outputs and either mails the information to the admin or logs it in.

Cons:

  1. It could be modified by an intruder or even take advantage of its features.
  2. It is meant to tighten the security, not a tool to be used to find security flaws. It does not directly correct errors found.

5 0
4 years ago
Which key prevents movement between cells in a spreadsheet?
Natasha_Volkova [10]

The Scroll Lock key - Most of the time on the keyboard it is abbreviated ScrLK, or Scroll Lock.

8 0
4 years ago
Other questions:
  • Trish has bought a new computer that she plans to start working on after a week. Since Trish has not used computers in the past,
    10·1 answer
  • Mike's boss told him he needs to be more efficient. Select each suggestion that will help him become more efficient at creating
    9·1 answer
  • A Programmer uses what piece of software?*
    12·1 answer
  • What power brake uses vacuum from the engine to aid in brake application?
    6·2 answers
  • Tasavvuf kelimesi soyut bir kelimedir.​
    7·1 answer
  • What is modern? explain​
    11·1 answer
  • Which term means the push that makes electrons move in a wire?
    13·2 answers
  • Need comments added to the following java code:
    6·1 answer
  • John has recently retired from an administrative, yet technical job which he held for 40 years. He decided to pursue a life-long
    11·1 answer
  • Select the correct answer.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!