1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Citrus2011 [14]
3 years ago
8

Sendddd meeeee memessss plsssssss

Computers and Technology
2 answers:
Nuetrik [128]3 years ago
7 0

Answer:

hey blake!!

Explanation:

there ya go

marishachu [46]3 years ago
4 0

Answer:

Hi it's OnePunchFan, i got banned and you prb dont

know me

You might be interested in
What is wrong with the following code?
Montano1993 [528]
Repost the picture there’s nothing here
8 0
2 years ago
. Given an initially empty stack s that accepts integers, the following operations are performed: s.push (10) s.push (20) s.push
sp2606 [1]

Answer:

a) The composition of the stack is :- 80,50,20,10.

Where 80 is the top and 10 is the last element.

b) The sequence of the popped items 40,30,70,60,90.

Explanation:

Stack is LIFO type data structure means Last in First Out.The element inserted last will be out of the stack first.The removal and addition is only at the one end that is top.

First 10,20,30,40 will be inserted in the stack. 40 is a the top.Now two pop operations occurs. 40 and 30 will be removed from the stack.

Now 50,60,70 will be inserted in the stack then again two pop operations so 70 and 60 will be removed from the stack.

Now the stack contains 50,20,10.Top = 50.

80 and 90 are added to the stack and 1 pop operation that is 90 will be removed.

Stack is 80,50,20,10 . Top = 80.

Sequence of integers popped=40,30,70,60,90.

4 0
3 years ago
Fill in the word to complete the sentence.
german

Answer:

Service Layer

Explanation:

7 0
2 years ago
Which protocol is well known for its use in the the home security and home automation industry, uses a mesh topology, makes devi
Masja [62]

Answer:

Z-Wave

Explanation:

Z-WAVE can be seen as a protocol which enables home automation and home security to take place because with home automation home appliances as well as lighting , sound systems among others can be smoothly control and monitor.

Secondly Z-WAVE make uses of mesh network, allow appliances to smoothly and successful communicate with each other.

Lastly Z-WAVE which is a wireless protocols make use of data transfer rate that is low.

Therefore Z-WAVE is important because it enables wireless monitoring of home appliances to take place in a smart home.

4 0
3 years ago
99 points!!! What would happen to the document if the change “A” is pointing to was accepted? a. There would be no changes. b. “
Sophie [7]
Probably, terrific would be inserted
3 0
3 years ago
Read 2 more answers
Other questions:
  • Did you see the fire, uh, fireworks last night? Which of the following sentences is the most correct way to format this accordin
    15·2 answers
  • Where is the insert function button found in microsoft excel?
    11·1 answer
  • Why was Unicode invented?
    6·1 answer
  • In this digital age of rapid communications, how can you justify the time it takes to stop and revise a message
    10·1 answer
  • Consider the program below: public class Test { public static void main( String[] args ) { int[] a; a = new int[ 10 ]; for ( int
    5·1 answer
  • In Java:
    15·1 answer
  • Find the basic period and basic frequency of the function g(t)=8cos(10πt)+sin(15πt)
    9·1 answer
  • Which statement is true about hacking?
    11·2 answers
  • Join each of the follwing sentences using unless
    14·2 answers
  • Multiple Select Which of these are ways a hacker might learn someone's password? Select 3 options. o social engineering keylogge
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!