1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fenix001 [56]
3 years ago
8

If anyone gotta ps4, i'm a 15 yr old female n if u wanna b frens, hmu :))

Computers and Technology
2 answers:
Crank3 years ago
5 0

                                   

                                                                                                                                                               

.    

.

................

vodomira [7]3 years ago
3 0

Answer:

daboi1001001

Explanation:

You might be interested in
One difference between multi-tasking using fork() versus using threads is that there is race condition among threads due to shar
MAXImum [283]

Answer:

vnn

Explanation:

7 0
3 years ago
Read 2 more answers
Variable X is a *
xxTIMURxx [149]

Answer:

Variable X is a local variable.

Explanation:

X exists only inside the sub.

6 0
3 years ago
You can use a server-side script as a ____ to access data from another domain.
Mashcka [7]
I believe the answer your looking for is "Proxy"
0 0
4 years ago
What will be the output of the following Python code? class A: def test1(self): print(" test of A called ") class B(A): def test
Vlad [161]

Answer:

"test of B called"

Explanation:

  • The object is created for the D class, but there are two test methods in class B and C.
  • The D class does not hold any test method. So when the object called the test method. Then the B method is called.
  • It is because the B class is declared first in the inheritance of D class like in the statement "class D(B, C)".
  • If the statement will be "class D(C, B)", then the C method will be called.
  • if the D class holds the method test, then only the D method will be called.
  • Hence the output is "test of B called".
7 0
4 years ago
Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow the
Anika [276]

Answer:

Possessed objects

Explanation:

Objects that are carried around by users to identify themselves with and to allow them access into computer systems are called possessed objects. Examples of such objects are;

i. smart cards

ii. driver's license

iii. id cards

iv. smart keys

v. smart watches.

Possessed objects are not the only way to allow authentication. Other methods are through memorized information (such as passwords, PINs) and through biometric devices (such as face recognition and voice recognition devices).

5 0
3 years ago
Other questions:
  • What is the value of the variable result after these lines of code are executed?
    5·2 answers
  • What is plagiarism?<br> EXPLAIN IT
    15·2 answers
  • Bloodborne pathogens travel by way of blood cells and can only be spread by person-to-person contact with infected blood
    5·2 answers
  • Abigail is writing an email to Justine Swenson, a friend of her best friend, Jane, inviting her to a get-together.
    7·1 answer
  • In which situations would it be most helpful to filter a form? Check all that apply.
    8·1 answer
  • Which statement is true about hacking?
    11·2 answers
  • Consider the following method.
    14·1 answer
  • How to get someone off your best friends list without blocking them
    8·1 answer
  • Is this statement true or false? While in slide show mode, if you are not careful you can close the application by clicking the
    10·1 answer
  • Does anyone know how to permanently delete photos on a dell computer? For my cousin.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!