1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shtirl [24]
2 years ago
5

Wanna play pubgill send u my id​

Computers and Technology
2 answers:
Nikitich [7]2 years ago
6 0
My sister would what’s your id
Ivahew [28]2 years ago
3 0

Answer:

Nah ill pass

Explanation:

because I don't have module data so I am very sorry

You might be interested in
The conventional wisdom concerning the security frameworks of domains is that it is always preferable for an organization to cre
Valentin [98]

Answer:

False

Explanation:

A Domain Based Security. "Domain Based Security", abbreviated to "DBSy", is a model-based approach that is being used in analyzing information security risks in a business context and offers an apparent, understandable and direct mapping among the risks and the security controls needed to handle them.

While A security domain is the list of items a subject is permitted to access. More largely defined, domains are collections of subjects and objects with related security requirements.

6 0
3 years ago
Which layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two
s2008m [1.1K]

Answer:

Network.

Explanation:

The Transmission Control Protocol/Internet Protocol (TCP/IP) model is a standard networking protocol which allows network devices such as routers, switches, and host computers to interconnect and communicate with one another over a network. The Transmission Control Protocol/Internet Protocol (TCP/IP) model comprises of four (4) layers and these includes;

I. Application layer.

II. Transport layer.

III. Internet layer.

IV. Network layer.

The network layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two nodes.

Basically, this layer known as network layer is the fourth layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model and it is typically responsible for the transmission of packets from one network device to another.

4 0
2 years ago
This unit is used to print the picture on a paper
NeTakaya

Answer:a printer

Explanation:

It prints things

7 0
2 years ago
Is ryzen really better for all-around purpose, and intel is better for gaming?
barxatty [35]

Answer:

Its really personal preference G.

Explanation:

But what you said is about right.

6 0
3 years ago
Data entered in a cell will appear in the bar, found about the worksheet
Setler79 [48]

Answer:

formula bar

Explanation:

The formula bar in Excel is located next to the name box

and above the worksheet area. It displays the data stored in

the active cell. The formula bar is used to view, enter, and

edit values and formulas in cells.

3 0
2 years ago
Other questions:
  • WILL UPVOTE ALL.
    7·1 answer
  • Create a Rational number class in Java using the same style as the Complex number class created in class.(The in class example c
    12·1 answer
  • A method's name and parameter list constitute the method's ____.
    13·1 answer
  • How much electricity is in the human brain? ​
    8·2 answers
  • The first row in a table is referred to as the _____ row and the last row is considered the _____ row.
    9·1 answer
  • p25: File Write and Read1) User enters a file name (such as "myMovies.txt").2) User enters the titles of 4 of their favorite mov
    12·1 answer
  • Hide Time Remaining A
    11·1 answer
  • Witch icon allows you to see paragraph formatting feature
    6·1 answer
  • What is the role of computer in modern problem solving​
    13·1 answer
  • Given the following declaration, what is the value of b[ 1 ][ 0 ]? int b[ 2 ][ 2 ] = { { 1 }, { 3 , 4 } };
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!