1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valkas [14]
3 years ago
6

Is anybody has to know the person delete account or not on brainly pl plz​

Computers and Technology
1 answer:
Oliga [24]3 years ago
8 0

Ummmm.......

Nah.......

You might be interested in
What was the attitude of the U.S. Senate towards the Treaty of Versailles, and why did they have that attitude?​
Arte-miy333 [17]

Answer:

in 1919 the Senate rejected the Treaty of Versailles, which formally ended World War I, in part because President Woodrow Wilson had failed to take senators' objections to the agreement into consideration. They have made the French treaty subject to the authority of the League, which is not to be tolerated. hope it helps in someway ig idk

Explanation:

8 0
3 years ago
Vendors who use open source as part of their product offerings can expect to bring new products to the market faster because: Gr
tamaranim1 [39]

Answer:

A.  they can skip whole segments of the software development process.

Explanation:

A software development process refers to the process of dividing software development work into various phases for product management, project management and to improve the design.

Vendors who use open source as part of their product offerings can expect to bring new products to the market faster because they can skip whole segments of the software development process.

They don't have to go through different phases of software development.

6 0
3 years ago
your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
Ivan

The protocol that should be used to establish a secure network connection for backups is SSH.

<h3>Secure Shell</h3>

SSH stands for <u>Secure Shell</u>. SSH is a <u>protocol that allows users to remotely control and modify servers</u>. SSH is commonly used by administrators to manage certain systems or applications remotely. So the admin can enter the computer via the network, then run various commands to modify or manage files from one computer to another.

SSH has several crucial functions for managing data transfer traffic. Specifically, the following are the functions and benefits of SSH:

  • Securing remote access to SSH-enabled systems or network devices for the user and processing them automatically.
  • SSH will automatically terminate the connection if there is suspicious activity on the connection used. So you can avoid various cyber threats such as IP and DNS spoofing, data manipulation, illegal tracking, and others.
  • Perform automatic and secure file transfers.
  • Launch commands securely on remote devices or systems.
  • Perform secure component management of network infrastructure.

Learn more about Secure network connection: brainly.com/question/28083478

#SPJ4

8 0
1 year ago
When using an online media source, students should ensure the information is
OLEGan [10]
Viable and true. hope this helps!
6 0
4 years ago
Read 2 more answers
Write a program that accepts a phrase of unspecified length on the command line. For example: prompt% letter print Operating Sys
Sedaia [141]

Answer:

Check the explanation

Explanation:

#define _MULTI_THREADED

#include <pthread.h>

#include <stdio.h>

#include <errno.h>

#define           THREADS          2

int               i=1,j,k,l;

int argcG;

char *argvG[1000];

void *threadfunc(void *parm)

{

int *num;

num=(int*)parm;

while(1)

   {

   if(i>=argcG)

   break;

   if(*num ==1)

   if(argvG[i][0]=='a' ||argvG[i][0]=='2'||argvG[i][0]=='i' ||argvG[i][0]=='o' ||argvG[i][0]=='u')

   {

   printf("%s\n",argvG[i]);

   i++;

   continue;

   }

    if(*num ==2)

   if(!(argvG[i][0]=='a' ||argvG[i][0]=='2'||argvG[i][0]=='i' ||argvG[i][0]=='o' ||argvG[i][0]=='u'))

   {

   printf("%s\n",argvG[i]);

   i++;

   continue;

   }

   sched_yield();

   }

return NULL;

}

int main(int argc, char *argv[])

{

pthread_t            threadid[THREADS];

int                  rc=0;

int                  loop=0;

int arr[2]={1,2};

argcG=argc;

for(rc=0;rc<argc;rc++)

argvG[rc]=argv[rc];

printf("Creating %d threads\n", THREADS);

for (loop=0; loop<THREADS; ++loop) {

     rc =pthread_create(&threadid[loop], NULL, threadfunc,&arr[loop]);

}

for (loop=0; loop<THREADS; ++loop) {

   rc = pthread_join(threadid[loop], NULL);

}

printf("Main completed\n");

return 0;

}

The below attached image is a sample output

3 0
3 years ago
Other questions:
  • Which of the following would an interactive media proffessional must likely need
    9·1 answer
  • Within the hardware of the personal computer temporary memory is known as
    10·2 answers
  • You've formatted the first paragraph of a document. What button can you use to apply the formatting from the first paragraph to
    9·2 answers
  • What are some of the causes for error 1921 when updating?
    11·2 answers
  • Jane receives an email claiming that her bank account information has been lost and that she needs to click a link to update the
    13·1 answer
  • Where do you define parameter variables?
    14·1 answer
  • If I could make a Short Film on any topic it would be...how could that film change the world?
    9·1 answer
  • What is one disadvantage of transmitting personal data using digital signals?
    15·2 answers
  • Derek has to create a technical design of a complex floor plan using CAD. What will be most helpful for Derek to use to create t
    8·1 answer
  • TRUE/FALSE. a good with many close substitutes is likely to have relativelyelastic correct demand, since consumers can easily ch
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!