1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nignag [31]
3 years ago
7

New friends??? if you want to be my new friend go follow my gram

Computers and Technology
2 answers:
Ede4ka [16]3 years ago
5 0
Ok thank you for points lol
lord [1]3 years ago
4 0

Answer:

what you need

only friends

You might be interested in
Use the VBA Editor to create a new module. Type the following VBA code to createa custom depreciation function (be sure to inclu
zalisa [80]

Many Microsoft Access users are experienced with using macros to automate activities, but they are not knowledgeable with module code or the Visual Basic for Applications (VBA) programming language.

Many Microsoft Access users are experienced with using macros to automate activities, but they are not knowledgeable with module code or the Visual Basic for Applications (VBA) programming language.  All Microsoft Office products employ the VBA programming language. You can utilize it in Word documents, Excel spreadsheets, PowerPoint presentations, and Outlook in addition to Access. Additionally, Visual Basic 6's language and VBA's are highly similar. In actuality, the integrated development environment (IDE) and syntax editor are nearly identical.

The creation of macros is simple and involves selecting options from drop-down menus. It's simple to see the possibilities available after choosing an action and choose the best decision.

Know more about programming language:

brainly.com/question/23959041

#SPJ4

5 0
1 year ago
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be
coldgirl [10]

Answer:

The answer is "timing".

Explanation:

  • The time attack would be a security vulnerability that enables attackers that identify computer systems or network security issues by analyzing the period of the program's reaction to multiple levels.  
  • It is used in both RSA encryption and decryption of the modular exponentiation method but could be modified for just about any system not seem running in a fixed period.
6 0
3 years ago
What domain name would you be likely to find in the url of a large environmental group?
horrorfan [7]
The domain name you are likely will find in a url of  a large environmental group is .org.
The domain name .org is a generic top-level domain name system(DNS) used in the internet.The name is truncated from organization.
5 0
3 years ago
What does tech mean in technology?
g100num [7]

Answer:

abbreviation for technical or technological

3 0
3 years ago
Read 2 more answers
A(n)______keyboard helps reduce strain on the wrists and also improves accuracy in the long run.
Naddika [18.5K]
<span> ergonomics is the anwser

</span>
3 0
3 years ago
Read 2 more answers
Other questions:
  • Where is the thesis statement usually located in research paper?
    6·1 answer
  • Which field in a Transmission Control Protocol (TCP) header provides the next<br> expected segment?
    5·1 answer
  • i need a moderator or someone to answer this :/ why do i keep getting notifications that i have a new chat or a new answer/comme
    5·2 answers
  • Electricity fact topic
    10·2 answers
  • Write a program that extracts the last three items in the list sports and assigns it to the variable last. Make sure to write yo
    8·1 answer
  • Detecta 1 problema
    5·2 answers
  • Determine the number of character comparisons made by the brute-force algorithm in searching for the pattern GANDHI in the text
    7·1 answer
  • Why does 5 g mm wave require more cells to achieve a better signal
    6·1 answer
  • During the ___ phase of a software development project, members broadly define the features that the software should include
    15·1 answer
  • Which structures protect the cell? Select two options.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!