1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kaheart [24]
3 years ago
8

Join my giggl PLEASE i am so bored link will be in comments

Computers and Technology
2 answers:
asambeis [7]3 years ago
5 0

Answer:

in which app we had to join

Simora [160]3 years ago
4 0

Answer:

Hey what’s your pad let again I’ll explain on there

Explanation:

You might be interested in
Look at the following structure declaration.
myrzilka [38]

Answer:

B. a tag

Explanation:

In the structure definition given below:

struct Employee

{

string name;

int idNum;  

};

Employee corresponds to the tag of the structure. The tag is used to create additional instances of the structure. For example:

struct Employee e1;

struct Employee e2;

name and idNum are members of the Employee structure and are referenced using the dot notation. e.g.,

struct Employee e1;

e1.idNum=1;

7 0
3 years ago
Ruben is helping his team choose a leader. Of the people Ruben is considering, which one has qualities most related to being an
siniylev [52]

An effective team leader shows great skills in every area, shows great support and respect to his teammates and is very easy to get along with.

5 0
3 years ago
Read 2 more answers
The ___ are documents which uses http ?
givi [52]
The HTML is the answer
5 0
3 years ago
Network connects computers to a single computer to share files, folders, and printers,
Sunny_sXe [5.5K]

Answer:

That is a Server

Explanation:

I hope that is the answer you need.

4 0
3 years ago
Currently, the users in your company are required to use their IP addresses when connecting to other hosts. Since IP addresses a
Sonja [21]

Answer:

False

Explanation:

Using subnet mask will be helpful, what the subnet mask does is moving the IP address boundary bettween the part that represents a network and the part that represents a host, thus, instructing the operating system which IP addresses are on the local subnet. Then the operating will communicate directly with the other host without using the router. Once this is achieved, memorizing the IP addresses is needless.          

8 0
3 years ago
Other questions:
  • You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits m
    13·1 answer
  • What does bam file stand for computer terms?
    9·1 answer
  • Draw a project network from the following information. What activity(ies) is a burst activity? What activity(ies) is a merge act
    7·1 answer
  • Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data
    13·1 answer
  • Pls answer fast in five mins​
    12·1 answer
  • Alison retrieved data from a company database containing personal information on customers. When she looks at the SSN field, she
    14·1 answer
  • In ____, two or more disk drives become one large volume, so the computer views the disks as a single disk.
    13·1 answer
  • Hi who plays among us
    9·1 answer
  • 5. A Disk defragmenter tool does what to a computer HDD?
    6·1 answer
  • Identify three errors in this HTML code snippet:
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!