1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
puteri [66]
3 years ago
14

Hi can someone help me make a like a song for music Class pls I attached an example of what i need.

Computers and Technology
1 answer:
g100num [7]3 years ago
8 0

Answer:

i dont really like music so sorry i cant help i hope someone can help you with this.

You might be interested in
To display the size of your backup file, you can use the Windows program called: Windows Explorer Scan disk Defrag Windows Acces
Nitella [24]
Windows Explorer scan disk
7 0
3 years ago
Audience centered public speakers are inherently sensitive to the
DanielleElmas [232]
Diversity of their audiences
7 0
3 years ago
Read 2 more answers
I’m order to protect your passwords, don’t use easy-to-guess information, don’t share your passwords, and NEVER change your pass
Elena L [17]

Answer:

true!

Explanation:

its better to know your password :))

3 0
3 years ago
The code size of 2-address instruction is________________.? 5 bytes? 7 bytes? 3 bytes? 2 bytes
Finger [1]

Answer:

7 bytes

Explanation:

<u>2 Address Instruction</u>

The 2 address instruction consist 3 components in the format.

One is opcode,other two are addresses of destination and source.

<u>Example-</u>

load b,c | Opcode   destination address,source address

add a,d  | Opcode   destination address,source address

sub c,f    | Opcode   destination address,source address

Opcode consists of 1 bytes whereas destination address and source address consist of 3 bytes each.

(1+3+3) bytes=7 bytes

5 0
3 years ago
Linda moderates the comments section of an online travel magazine. Which type of comments should Linda flag or delete as inappro
kvv77 [185]
Generally, an online newspaper has a code of conduct for the comments accepted. Hate speech, racism, cursing, sexual comments or bigotry is usually not allowed. She may also want to be looking for spam comments such as links or ads where someone is trying to sell something from the comment section
8 0
3 years ago
Read 2 more answers
Other questions:
  • All formulas that begin with =IF will
    5·1 answer
  • On sites that use "cloud computing," how is your information being stored?
    13·1 answer
  • Many computer magazines and Web sites present comparisons of several DBMSs. Find one such DBMS comparison article and compare th
    10·1 answer
  • Which is the best description of the laws governing IT professionals?
    5·1 answer
  • Which component is a part of the CPU of a computer
    12·2 answers
  • What are the two basic classes of active directory objects?
    14·1 answer
  • A computer scientist creates an app that tells you a funny joke each time you touch the Joke button.
    15·1 answer
  • Was just testing how this works, no actual question; feel free to take the points anyways though. ​
    13·1 answer
  • Please tell fast plzzzzzzz​
    11·1 answer
  • How to tell if your phone is being monitored
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!