1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Korvikt [17]
3 years ago
10

For some points bc I’m nice like that.

Computers and Technology
2 answers:
saw5 [17]3 years ago
5 0

Patrick Star is my favorite character!!!!

Marysya12 [62]3 years ago
4 0

Answer:

I'd say Gary the snail. He has so much personality in such few words.

Explanation:

He's a god

You might be interested in
A search engine is a way to
Nataly_w [17]
<span>The answer is letter C which is a Search Engine. It is a program that scans for and recognizes things in a database that relate to catchphrases or characters indicated by the client, utilized particularly to find specific destinations on the World Wide Web.</span>
7 0
3 years ago
Read 2 more answers
How has 5G become more energy efficient?
photoshop1234 [79]

Option 4. The way that 5G is more efficient is that is is able to  utilize more energy efficient access points.

What is the 5G?

This is the term that is used to refer to the fifth generation mobile network. This is the latest generation of networks and it is known to be a faster way and a more efficient way of connecting to the internet when we compare it to the others that came before it.

This is known to have lower latency when we compare it to the 4G network. It is 100 times said to be faster than the 4G and more efficient for businesses and the people that use them. Hence the The way that 5G is more efficient is that is is able to  utilize more energy efficient access points.

Read more on 5G network here: brainly.com/question/24664177

#SPJ1

7 0
2 years ago
From the set ( 5 , 7 , 9 , 11 , 13 make the inequality w - 4 &lt; 8 true
Ksenya-84 [330]

Answer:

Explanation:

One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.

Fill a rectangular baking glass dish with water.

Place a plastic bag with ice in the water near the left edge of the dish.

Place a lighted lamp near the left edge of the dish so that its light falls directly on the plastic bag.

Put a few drops of ink in the water.

The student did not observe any circulation of ink in the water as expected because the experiment had a flaw. Which of these statements best describes the flaw in the experiment? (2 points)

Not enough ink was added.

Not enough water was taken.

The dish was too small for the experiment.

The lamp and the ice bag were at the same place.

7 0
4 years ago
Look at the picture, list down the things you must do to make it more organize​
Oxana [17]

Answer:

The electrical cable

Explanation:

The most dangerous is the electrical cable to be organised as much as you can as in case any damage or not double insulation could cause a harm to the people.

7 0
3 years ago
How serious are the risks to your computer security?
ASHA 777 [7]

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

6 0
2 years ago
Other questions:
  • What special identity group specifically includes any user account (except the Guest) logged into a computer or domain with a va
    14·1 answer
  • Given a string, return a version without the first and last char, so "Hello" yields "ell". The string length will be at least 2.
    13·1 answer
  • Double[][] vals = {{1.1, 1.3, 1.5},
    14·1 answer
  • State the rule of 72 for the number of years to halve.
    8·1 answer
  • What is the point of brainy when other people have to answer your questions but not the cumputer
    9·1 answer
  • In which step is a metaphor used in planning a multimedia presentation
    15·1 answer
  • The if statement regards an expression with the value 0 as __________.
    13·1 answer
  • FOR DIGITAL DESIGN/ PHOTOGRAPHY
    5·2 answers
  • The person that includes the most and funniest memes (screenshot from the web) gets brainliest.
    5·1 answer
  • Who do we need more in the world? Computer technicians, or electric technicians and why.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!