1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedbober [7]
3 years ago
15

What is a may may and how do i be may may

Computers and Technology
2 answers:
belka [17]3 years ago
8 0
“Maymay” is a phonetic spelling of a common mispronunciation of the word meme, which is typically used ironically in various online communities to mock mainstream Internet culture
k0ka [10]3 years ago
4 0

You be a maymay by killing Jonathan Wicklesworth form fortification nighttime

You might be interested in
A new repair technician reports that he or she is having trouble installing the operating system. The problem arises when he or
Ganezh [65]

Answer:

The cause of the problem is he attempted to put system files on a extended partition.

Explanation:

A extended partition is a type of file system used by the linux kernel operating system, usually most of windows OS doesn't recognize this as an operative partition and if it does, the type of files are going to be in conflict with the partition "structure". Usually a ext partition has a small size in relation with a FAT or NTFS partition, that added to the file type would be the main issue for the repair technician. The main objetive to this partition is to emulate a RAM memory and allow the fast interchange of data to the processor.

The other options:   put system files on a primary partition, partition the hard drive into one large section or partition the hard drive into four smaller sections SHOULD NOT BE A PROBLEM to make a normal operative system install.

8 0
3 years ago
Read 2 more answers
The ______________________ are incident management personnel that the incident commander or unified command assign to directly s
postnew [5]

Answer:

The Command Staff are the incident management personnel that the incident commander or unified command assign to directly support the command function.

Explanation:

Based on the information retrieved from the ICS (Incident Command System), to handle properly incidents that occur, Command Staff are assigned by the incident commander or unified command.

8 0
3 years ago
Checking authentication, checking authorization and access control, auditing systems, and verifying firewalls and other filters
nadezda [96]

Answer: Logical security list

Explanation:Logical security list that is used for checking of the authentication and authorization for the organizations. It consist the safeguarding the software, security access of password and other keys, system auditing, stages of the security etc.

These factors helps in the maintaining the level of the security and only authorized access to place in the system of a particular organization.Other options are incorrect because physical security system consist of the guards , locks etc physical devices, response plane is the feedback strategy and whiltelist is related with the acceptable people.

3 0
4 years ago
Show the dynamic and speculation execution for the following code
djyliett [7]

Answerf9,f10,fll

Explanation:

6 0
3 years ago
If your cousin wanted to view information from the world wide web, what application software would you tell her to be sure she h
MAVERICK [17]
Well, I would say a web browser, like Mozilla Firefox, Safari for IOS, Windows Edge, Chrome, or Internet Explorer; and some anti-malware software, since there are multiple websites on the WWW that try to steal your information and give your device viruses.
6 0
3 years ago
Other questions:
  • The most popular input device of a computer is a(n) ____.
    6·1 answer
  • When first created all charts always include___and a chart area
    8·2 answers
  • How long does the Splunk search job remain active
    5·1 answer
  • We say that a sequence of numbers is a palindrome if it is read the same backward or forward. For example, the sequence: 6, 15,
    11·1 answer
  • Why are video games interesting?
    5·1 answer
  • On a chart created in excel, the horizontal axis is also called the ____.
    15·1 answer
  • Which options are available when a business creates a new theme? Check all that apply.
    12·1 answer
  • . Is it conceivable to design a secure operating system for these computer systems? Give arguments for and against.
    6·1 answer
  • What do you do when you have computer problems? Check all that apply.
    12·2 answers
  • The ________ is specifically designed for situations requiring a counter variable to control the number of times a loop iterates
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!