1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zanzabum
3 years ago
9

Why was the 80s bad for Disney i know one example but ill tell you after you answer

Computers and Technology
1 answer:
Bond [772]3 years ago
5 0

Answer:

The dark stories behind it? i dont  know lol

You might be interested in
When entering numbers that start with a zero, apply the _____ number format.
yuradex [85]

Answer:

The Answer is gonna be D. Zero decimal

3 0
2 years ago
What is a attack vector<br>​
kogti [31]

Answer: A vector in computing, specifically when talking about malicious code such as viruses or worms, is the method that this code uses to propagate itself or infect a computer. This sense is similar to, and derived from, its meaning in biology

Explanation:

give me a Brainliest

3 0
3 years ago
What are some of the challenges of note-taking? Check all that apply.
Anvisha [2.4K]

Explanation:

it can take up a great deal of time in class.

it can be distracting in the middle of a lecture.

it can cause the student to miss information.

3 0
3 years ago
Read 2 more answers
I have a question involving do and for loops while using arrays.
larisa86 [58]

Answer:

i just got my new pc

Explanation:

5 0
3 years ago
Kenny needs to keep client information such as names and addresses. She should use a
Aneli [31]
Folder!
They cost like 97. Cents
5 0
3 years ago
Read 2 more answers
Other questions:
  • Altering grade records within a computer system is called
    11·2 answers
  • Files with what two file extensions are commonly known as tarballs??
    8·1 answer
  • A 5-stage MIPS pipeline has a register file without forwarding mechanism. How many NOPs (or bubbles) will you need to add to mak
    9·1 answer
  • Write a c program to count the total number of commented characters and words in a c file taking both types of c file comments (
    11·2 answers
  • A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
    9·1 answer
  • What is the location used by users to configure delegate access on their own mailboxes? Backstage view &gt; Account Settings Bac
    12·1 answer
  • You are the IT Administrator for a small corporate network. Until now, the network has consisted only of workstations accessing
    6·1 answer
  • Enumerate the the risk in the preparation and cooking in starch and cereal dishes and other food​
    11·1 answer
  • A customer in Lowe's needs help. Matt works in shipping and receiving. It isn't Matt job to work with the customer, but he knows
    15·2 answers
  • Please help me.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!