1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vanyuwa [196]
3 years ago
5

Make this be a 7th grade argument over a boy

Computers and Technology
2 answers:
Vilka [71]3 years ago
8 0
He wants me not you LOL
ipn [44]3 years ago
4 0

Answer:

No hes mine

Explanation:

Ill kiss him first and he takes me to Build-A -Bear soo hahahah

ur a loser

like i totally love him

oop-

Can i have brainliest

You might be interested in
According to which virtue do you need to secure information by limiting computer access to authorized personnel only?
stealth61 [152]

The answer is A : 256 or 2 to the 8th power different combinations.  In EBCDIC (Extended Binary Coded Decimal Interchange Code).  It is an 8-bit code allowing 256 possible combinations of textual symbols.  (2 to the 8th power = 256)

7 0
3 years ago
A system developer needs to provide machine-to-machine interface between an application and a database server in the production
nordsb [41]

Answer:

The correct option is (d) Use a service account and prohibit users from accessing this account for development work

Explanation:

Solution

As regards to the above requirement where the application and database server in the production environment will need to exchange the data once ever day, the following access control account practices would be used in this situation:

By making use of a service account and forbids users from having this account for development work.

The service account can be useful to explicitly issue a security context for services and thus the service can also access the local and the other resources and also prohibiting the other users to access the account for the development work.

Submitting an adhoc request daily is not a choice as this is required daily. Also, the servers can be different and cannot be put in one place. and, we cannot make use of the read-write permission to the members of that group.

7 0
3 years ago
Which of the following are good backup methods you can use to protect important files and folders from loss in the case of a har
grigory [225]

Answer:A,B, and D

Explanation:

6 0
3 years ago
Read 2 more answers
We will find an video named????<br> Help us and select once name. <br> Complete: B__in___t
liberstina [14]
Beint cause its cool yea yea
7 0
3 years ago
Read 2 more answers
Create a cell reference in a formula by typing in the cell name or
il63 [147K]

Answer:

D. Clicking the cell

Explanation:

Clicking the target cell is an alternative way of typing in the cell name when creating a cell reference in a formula.

Hope this helps!

8 0
3 years ago
Read 2 more answers
Other questions:
  • Using the expected format, of putting key information where the reader can’t find it, is an example of?
    8·2 answers
  • A(n) _______________ is a collection of configuration and security settings that an administrator has created in order to apply
    14·1 answer
  • Eye wash stations should contain enough water to provide ______ minutes of continuous use
    5·2 answers
  • Which of these is one of the primary concerns for protecting your family when online?
    9·2 answers
  • discuss the benefits of normalization, and do you think we should normalize our designs to higher levels than 3NF? Why or why no
    9·1 answer
  • Which statement best describes desktop publishing?
    10·1 answer
  • PLEASE HELP!!!!! WILL MARK BEST ANSWER BRAINLIEST!!!~~~
    11·2 answers
  • Implement the function printTwoLargest that inputs an arbitrary number of positive numbers from the user. The input of numbers s
    14·1 answer
  • Add me on Fortn!te <br> TsarBacon (imma girl)
    11·1 answer
  • Create a list called courses containing the names of your current courses.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!