1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
2 years ago
12

If i keep giving out brainlyest will i get banned again?

Computers and Technology
2 answers:
attashe74 [19]2 years ago
6 0

Answer:

Explanation:

Yes, most likely

Dima020 [189]2 years ago
3 0

Answer:

yes ma'am

Explanation:

You might be interested in
Help fast plzzzzzzzzzzzz ​
eimsori [14]

Answer:

Which question would you like help with?

4 0
3 years ago
Read 2 more answers
What are the two main components on the motherboard?
Advocard [28]
<span>A chipset which forms an interface between the CPU's front-side bus, main memory, and peripheral buses. Non-volatile memory chips (usually Flash ROM in modern motherboards) containing the system's firmware or BIOS. A clock generator which produces the system clock signal to synchronize the various components.</span>
6 0
2 years ago
Read 2 more answers
How should I do it Please code for Java
andrew-mc [135]

Answer:

class Main {  

 public static void printPattern( int count, int... arr) {

     for (int i : arr) {

       for(int j=0; j<count; j++)

           System.out.printf("%d ", i);

       System.out.println();

     }

     System.out.println("------------------");

 }

 public static void main(String args[]) {

   printPattern(4, 1,2,4);

   printPattern(4, 2,3,4);

   printPattern(5, 5,4,3);

 }

}

Explanation:

Above is a compact implementation.

3 0
3 years ago
Which of these benefits can be achieved whensoftware is restructured?
Ivenika [448]

Answer:

iv. all of the given options

Explanation:

This is the correct answer because this is what happens when software is restructured.

<em>PLEASE</em><em> </em><em>DO MARK</em><em> </em><em>ME AS</em><em> </em><em>BRAINLIEST</em><em> </em><em>IF</em><em> </em><em>MY ANSWER</em><em> </em><em>IS HELPFUL</em><em> </em><em>;</em><em>)</em><em> </em>

4 0
3 years ago
A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's co
netineya [11]

Answer:

The answer is "The PC should be kept in a physically secure location".

Explanation:

In general, malicious users are hackers as well as malicious users. This user indicates that even a rogue worker, contractor, student, and another consumer who uses his sensitive rights is indeed a common word of violation of information in security circles and the headlines, and to manage the data from the theft the system should be on the physically secure location, that refers to any place, a room or a group of room within facilities of physical or staff security protocols that are sufficient to support the AI-based on LEIN and related Is a physically safe room.

7 0
2 years ago
Other questions:
  • Encryption is the process of:
    12·1 answer
  • Which of the following is an unintended consequence of pesticide use on crops?
    10·1 answer
  • In which career field would the computing technology industry associations compTIA A+ certification be useful
    6·1 answer
  • What do developers do to support software products
    14·1 answer
  • What can act as a buffer against unemployment
    11·1 answer
  • Retrieve the names of employees who work on exactly one project that is controlled by their department. (It does not matter how
    7·1 answer
  • How do I type the integral symbol?
    6·1 answer
  • Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and
    13·1 answer
  • What is python, the coding language
    6·2 answers
  • Rachelle is writing a program that needs to calculate the cube root of a number. She is not sure how to write the code for that
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!