1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
abruzzese [7]
3 years ago
9

How many of yall are willing to subscribe to my channel called "Space Juice" with around 248 subs?!​

Computers and Technology
2 answers:
Deffense [45]3 years ago
6 0
Sure I don’t see why not
Alborosie3 years ago
5 0

Answer:me 148

Explanation:

You might be interested in
How to bypass a Lightspeed and Rocket Filter blocked website without being a admin and without downloading extensions? Must incl
AVprozaik [17]

You really cant without being admin. Calm yaself child

6 0
3 years ago
A spreadsheet is an interactive computer program used for
aksik [14]
Making charts, files that need complicated calculations
5 0
3 years ago
Blogs may refer to any kind of communication over the internet is true​
Sliva [168]

Answer:

Yes It's true but You forgot email

Explanation:

6 0
3 years ago
3. SmartArt can be used to create that highlight relationships between two items.
KengaRu [80]
<span>SmartArt can be used to create graphic organizers (Solution:B) that highlight relationships between two items. With SmartArt you can make visual representation of your ideas and information. The tool SmartArt is available </span>in Excel, PowerPoint, Word, but also you create SmartArt object in Outlook.
There are different layouts available for this type of representation.
8 0
4 years ago
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
Other questions:
  • Write a for loop that iterates from 1 to numbersamples to double any element's value in datasamples that is less than minvalue.
    15·1 answer
  • Why does this say I'm in middle school?
    11·1 answer
  • What allows a person to interact with web browser software?
    13·2 answers
  • When assembling a desktop computer you should always install the drives before the motherboard?
    9·1 answer
  • Assume that there is a class called BankAccountHolder that represents an individual member of a bank. There is also a BankAccoun
    5·2 answers
  • The major objective of this lab is to practice class and object-oriented programming (OOP), and separate files: 1. We will reuse
    5·1 answer
  • Programmers should strive to _____. increase coupling increase cohesion both of the above neither a nor b
    7·1 answer
  • कम्प्युटर को पहिलो पुस्ता भनेको के हो?​
    8·2 answers
  • Question 19
    9·2 answers
  • Hey guys join me
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!