1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serga [27]
3 years ago
8

How many of yall are willing to subscribe to my channel called "Space Juice" with around 245 subs?!​

Computers and Technology
1 answer:
Sliva [168]3 years ago
4 0

Answer:

I will

Explanation:

You might be interested in
What would a world where we have 2^128 (340 undecillion) Internet connected devices look like? How could that much Internet usag
cluponka [151]

A world  have 2^128 (340 undecillion) of IPv addresses that helps to connect to the internet. IPv6 addresses can make it easier for working organizational teams connecting to the Internet, IP addresses that are created by IPv6 are 128 bits.

<h3>What is internet?</h3>

Internet is the system  uses the Internet protocol suite (TCP/IP)  and interconnected computer networks that communicate between two or more individuals.

Today, almost 20 IP addresses are taken by7 each home for each electronic device. The internet usage is so wide, that even a simple task  is not possible without it. Even a simple task can be done using internet.

Learn more about internet.

brainly.com/question/13308791

#SPJ1

5 0
2 years ago
Which option best describes a trustworthy person?
jasenka [17]
<span>A person who babysits your kids or who you tell your secrets to.



A example since you dont have choices</span>
5 0
4 years ago
Read 2 more answers
Need answer quick plz.
morpeh [17]

Answer:

SPSS

IS THE ANSWER

IHOPEIT WILL HELP YOU

4 0
3 years ago
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
Marys total out of pocket costbwere for the year​
aleksandrvk [35]
For the year or for the month?
3 0
4 years ago
Other questions:
  • What is a “spoof” of an ad ?
    8·2 answers
  • Create a DisplayBox application that prompts the user for a height and width and then displays a box of that size. The DisplayBo
    8·1 answer
  • Write a dialogue between two friends who are debating on popularity or property​
    6·1 answer
  • An app builder wants to show groups as the last navigation menu item in the Salesforce1 mobile app. However, the app builder is
    8·1 answer
  • You have just installed a SOHO router in a customer's home and the owner has called to say his son is complaining that Internet
    5·1 answer
  • Type the correct answer in the box. Spell all words correctly. Joseph is a digital media developer and has years of work experie
    15·1 answer
  • Are all tps dashboards
    15·1 answer
  • Do you see traffic flowing from the internet into your system or from your network to the internet? explain why or why not:
    6·1 answer
  • Where does an antivirus run suspicious applications?
    12·1 answer
  • Write an algorithm to calculate the average<br> value of array of integer elements
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!