1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natulia [17]
3 years ago
9

Kenny FRIEND ME. Ps that is my brother

Computers and Technology
2 answers:
LuckyWell [14K]3 years ago
8 0

Answer:

kenny?

Explanation:

I belibd this is Kenny because I just need to ask a question lol

Maslowich3 years ago
3 0

Answer:

who is kenny

Explanation:

You might be interested in
ap csp The local, remote, and upstream _______ can each have multiple ___ _____. When a participant in a collaborative group on
ratelena [41]

Answer:

The Local, Remote and Upstream repository can each have multiple push /pull requests. When  a Participant in a collaborative group on Github is ready to have their work used by the group,  the participants makes a pull request.

Explanation:

These are simple blanks which are answer here

The Local, Remote and Upstream <u>repository</u> can each have multiple <u>push /pull</u> requests. When  a Participant in a collaborative group on Github is ready to have their work used by the group,  the participants makes a <u>pull request</u>.

8 0
3 years ago
Size of a request header field exceeds server limit.
garri49 [273]
Try to Increase the value for the directive LimitRequestFieldSize in the httpd.conf:


Reason: This is normally caused by having a very large Cookie, so a request header field exceeded the limit set for Web Server.
For IBM® HTTP Server, this limit is set by LimitRequestFieldSize directive (default 8K). The LimitRequestFieldSize directive allows the Web server administrator to reduce or increase the limit on the allowed size of an HTTP request header field.
SPNEGO authentication headers can be up to 12392 bytes. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks.

8 0
3 years ago
HELP PLEASE!!! Which development method is best explained in this way: a creation of a prototype model that will eventually be d
DerKrebs [107]

Answer:

Not sure but I think its Rapid Prototyping Method

4 0
3 years ago
Maria noticed last month that her ad often showed up beside a competitor's ad for the same search terms. How can Maria understan
timurjin [86]
In order for Maria to be able to find out her performance and to compare it from other advertisers, she needs to direct herself and to use the auction insights reports that will allow her to view in which rank she is placed in and to identify and know her performance in comparing it with other advertisers' performance.
3 0
3 years ago
Read 2 more answers
Hey are u guys in any zoo/m rn ?​
tester [92]

Answer: Nope. Why???

Explanation:

6 0
3 years ago
Other questions:
  • A(n) ______ database stores data in tables that consist of rows and columns.
    5·2 answers
  • Answer these two if u can❤️
    5·2 answers
  • Enumeration is defined as the process of extracting user names, machine names, network resources, shares, and services from a sy
    13·1 answer
  • IN YOUR OWN WORDS, create a new thread and compare and contrast paraphrasing, summarizing, and quoting and how to do each succes
    14·1 answer
  • An attribute that can have more than one value for each entity instance is referred to as:
    10·1 answer
  • Which of the following is the path to the Zoom button?
    8·1 answer
  • Which are technical and visual demands<br> that need to be considered when<br> planning a project?
    6·1 answer
  • Show the dynamic and speculation execution for the following code
    6·1 answer
  • What is the BCC feature used for?
    12·2 answers
  • Write an essay about yourself based on the dimensions of ones personality​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!