1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeyben [28]
3 years ago
13

Ok so.. I wanna know ur guys go-to coor and hat for Among Us (mines purple with the ninja band)

Computers and Technology
1 answer:
aleksandr82 [10.1K]3 years ago
7 0

mine is lime and ninja band look at us we twins<3

You might be interested in
Outside of a C program, a file is identified by its ________while inside a C program, a file is identified by a(n) ________. fil
Alexxandr [17]

Answer: name, file stream object

Explanation:

4 0
2 years ago
What are the binary symbols?
alexgriva [62]

Answer:

Explanation:

a binary number is a number expressed in the base-2 numeral system or binary numeral system

4 0
3 years ago
Read 2 more answers
In a spreadsheet, what is the rectangular space where a row meets a column?
e-lub [12.9K]
This space is called a cell
6 0
3 years ago
Read 2 more answers
What does limited access to a document mean?
Vlad [161]

Answer:

D. It does not reflect any changes made in the document

Explanation:

A limited access is usually done by middle level and top level managers in an organisation to prevent other staff member to edit or make changes to confidential documents when they are out of the office, though the staff can read it, they can not make changes to it.

6 0
3 years ago
Read 2 more answers
________ and wpa are wireless security protocols which use encryption to secure wi_fi networks.
ra1l [238]
Im pretty sure its WEP :)
7 0
3 years ago
Other questions:
  • What are the key goal, performance, and risk indicators?
    15·1 answer
  • You've been asked to find the largest number in a range of numbers. Which of the following could you use to find the largest num
    8·1 answer
  • What kinds of online behaviors could be considered cyberbullying?
    7·2 answers
  • Select all the correct answers. Which two statements are true about an OS? translates the user's instructions into binary to get
    10·1 answer
  • Which feature allows users to see all suggestions for edits to a document at once?
    7·2 answers
  • What is LINUX?
    6·2 answers
  • Is social media bringing people together or cause in sepretation?​
    11·2 answers
  • Which wireless standard runs on both the 2.4 and 5 GHz frequencies?
    11·1 answer
  • Why are computer simulations useful in studying phenomena in the universe?
    15·1 answer
  • By default word documents include _______ margins on all sides of the document.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!