1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melomori [17]
3 years ago
15

If you got band from a local library, what would be the reason for it besides shouting and talking? You're answer has to fit you

're personality?
Computers and Technology
2 answers:
Jlenok [28]3 years ago
8 0

Answer:

probably bc ill be having a book fight

Explanation:

VLD [36.1K]3 years ago
4 0

Answer:

I would get a band from the library because I check out ten books and returned them in a week. I also would just be in the library all the time and they would get frustrated. That or I would spend hours talking to a librarian about my favorite books and they would get fed up with me.

You might be interested in
My game is telling me to "Press any key." Where is the "any" key?????
Alja [10]

Answer:

It's mean press any key which you want to press.

There is no key called "any" key.

4 0
3 years ago
Student creates a Raptor program and uses the File Input and Output method to find the average of 5 test scores stored in a text
masya89 [10]

Answer:

The question was solved using an algorithm later translated to a flow chart that adds five scores giving the sum and calculating the average.

Explanation:

4 0
2 years ago
What impact download speeds on different computers
solong [7]

Answer:

They're connected in different ways.

Explanation:

Speeds will vary by connection type. Ethernet (often called wired) is almost always faster than wireless.

7 0
3 years ago
Who developed one of the first mathematical models of a multilevel security computer system?
svp [43]

Answer:

C. Bell and LaPadula

Explanation:

The first mathematical models of multilevel security computer system was developed by Bell and Lapadula. Their full names are David Elliot Bell and Leonard J. Lapadula. Their model used to define the concept of modes of access,secure state machine and outlined the rules of access.

6 0
2 years ago
Which of the following would be the most appropriate way to define a method that calculates and returns the final price, after t
Oksanka [162]

D. I hope it helped
5 0
2 years ago
Other questions:
  • Read the spreadsheet formula below, then answer the question.
    14·2 answers
  • Troubleshooting a printer that does not work includes a. connecting the printer to your computer b. checking to see if there is
    13·1 answer
  • How many bit does four gigabyte has
    8·2 answers
  • What function would you use to find the mean in a Microsoft excel document ?
    6·2 answers
  • Fred wants to analyze his spending habits of the past few years and has gathered information on the checks he has written from 2
    6·1 answer
  • Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera
    12·1 answer
  • The objective of an Enterprise Resource Planning (ERP) system is to create a customized software program that integrates the inf
    15·1 answer
  • Project light with a system of lenses used for projecting slides or film into a screen.
    5·1 answer
  • Give an example of how loops are used in programming Kturtle​
    7·1 answer
  • The impact of the destruction of train station on the budget of the minister of finance
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!