1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shtirl [24]
3 years ago
5

Wanna play pubgill send u my id​

Computers and Technology
2 answers:
Nikitich [7]3 years ago
6 0
My sister would what’s your id
Ivahew [28]3 years ago
3 0

Answer:

Nah ill pass

Explanation:

because I don't have module data so I am very sorry

You might be interested in
░░░░░░░░██████████████████
ELEN [110]

OMG YUHHH

( Also I need one more brainliset until I get expert )

7 0
3 years ago
Turn-outs are features of roadways that are to be employed by
JulsSmile [24]
<span>They are made for vehicles that are slow moving or should travel at a low speed so as not to endanger the lives of other drivers on the road, they are signs that prevent bottlenecks with slow vehicles, which for one reason or another, they cannot travel at a higher speed than others cars in the road, this mostly is noticed in cargo trucks carrying heavy cargo during a long journey.</span>
3 0
3 years ago
Mason has created a website for his presentation so that people can access relevant resources during or after the presentation.
skelet666 [1.2K]

Answer:

Option E is the correct option.

Explanation:

When any user has created any websites for presenting his presentation by which users can access appropriate tools at the time of the presentation or afterward.  

So, in the presentation process, the following user integrated social media because he wanted that the other users can access the relevant tools for the presentation.

6 0
3 years ago
Alice's public key, and sends back the number R encrypted with his private key. Alice decrypts the message and verifies that the
Agata [3.3K]

There are different kinds of keys. The identities of Alice and Bob are verified in this protocol.

<h3>What is public and private key in SSL?</h3>

These keys are known to be a kind of related pair of text files and they are often made together as a pair if one makes their Certificate Signing Request (CSR).

Note that the private key is different file that is often used in the encryption/decryption of data so as to sent a file between one's server and the connecting clients.

Learn more about  public/private key from

brainly.com/question/8782374

3 0
2 years ago
Open Meet and enter this code: jnw-xodp-yij only for boys​
Agata [3.3K]
Skegeuabdvsjalalsjsn
8 0
3 years ago
Read 2 more answers
Other questions:
  • During the Requirements Definition stage of a systems development​ project, the employees who will be the primary users of the n
    15·1 answer
  • Phase 1 RequirementsCode submitted for Phase 1 will only have the following capability. Any additional coding will result in the
    13·1 answer
  • 3. Do some Internet research on the use of VLANs in hospitals. Summarize the benefits of using VLANs in hospitals and identify e
    14·2 answers
  • Rebecca completed work on a computer and is verifying the functionality of the system when she finds a new problem. This problem
    15·1 answer
  • I need help for preparing for a presentation. Can someone give me advice so I don't have a panic attack again?​
    11·2 answers
  • Films on Demand provides you with a digital collection of streaming videos. The database includes documentaries, educational fil
    7·1 answer
  • Database developers use the ________ to create relationships in the database.
    7·1 answer
  • Prebuilt colors from a document are called
    12·1 answer
  • What is your definition of Digital Safety?
    6·1 answer
  • While shopping online, Tucker visits a website that looks outdated and has limited reviews. Which of the following strategies sh
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!