1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
3 years ago
9

'|'/2`/ '|'[] |)[-([]|)[- '|'#!$

Computers and Technology
1 answer:
natita [175]3 years ago
7 0

Answer: mr Man

Explanation:

You might be interested in
why does my Minecraft screen this "play and "settings" instead of the regular layout with singleplayer, multiplayer, and options
ratelena [41]

Answer:

Are you Minecraft Java or Minecraft Bedrock?

Are you updated to the latest Firmware?

8 0
3 years ago
Read 2 more answers
What is the key value proposition of Google Search campaigns?A. Appear as a text ad, a video ad, or a banner ad on one of Google
crimeas [40]

Answer:

The correct option is D: Show your ads when a customer is searching for your product or service

Explanation:

Google Search Campaigns allows for advertisement display when you run a search on Google Search. It then displays the result of the search in the search results. The key value proposition of Google Search Campaigns is "Show your ads when a customer is searching for your product or service". Google Search Campaigns are known to be a very popular online advertising form.

5 0
3 years ago
There is something wrong with the arguments the function is getting; a precondition is violated​
Evgesh-ka [11]

Answer:

It indicates that either the argument is not corresponding to the perimeter or not returning the same as the variable or function. They arise a syntax error and Python parser is unable to understand a line of code.

Explanation:

8 0
3 years ago
If we develop a new policy for our environment that requires us to use complex and automatically generated passwords that are un
stepan [7]

Answer:

The answer is "Login complexity will be increased very exponentially".

Explanation:

In computer science, The password is also known as a series of characters, which allows you to use the validation process to validate any customer's privacy.  

  • It is normal usage of passwords that work together with a username to make it, it only accessible by the user, and to give the user accessibility to a computer, software or web page.
  • If the password is more complex so, it is hard to learn, and it also provides login complexity, that's why we must use a less complex password.
7 0
3 years ago
To set up a slide show you should do all of the following except ______.
Harlamova29_29 [7]
To set up a slide show you should do all of the following except exit without saving
5 0
4 years ago
Other questions:
  • When you ____ software, you are adapting it from one type of computer or operating system to run on a different computer or oper
    13·1 answer
  • When driving a truck is fuel crucial
    9·1 answer
  • (TCO 4) What will the following program segment display? int funny = 7, serious = 15; funny = serious % 2; if (funny != 1) { fun
    14·2 answers
  • An actual printout of computer data always satisfies the best evidence rule?
    12·1 answer
  • What is an overview of your opinion of Digital Etiquette? Do not look it up bc I will know!
    7·1 answer
  • Given the 8-bit binary code 10011011, what is the equivalent decimal value?
    5·1 answer
  • According the SDLC phases, which among these activities see a substantial amount of automation initiatives?
    12·2 answers
  • The density of mercury is 13.6 grams per cubic centimeter. Complete the steps for converting 13.6 g/cm3 to kg/m3.
    9·1 answer
  • A major way the National Information Infrastructure Protection Act of 1996 amended the Computer Fraud and Abuse Act was the subs
    15·1 answer
  • What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!