1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anestetic [448]
3 years ago
7

Who watched Unus Annus??? (If you did what was your favorite part?​

Computers and Technology
1 answer:
quester [9]3 years ago
3 0

This video was completeley unedited was a banger, and so was the vid where they made robot amy. that was hilarious.

But since it is now Post Mortem all say here is...

Unas Annus. Memento Mori.

It sure was fun.

You might be interested in
The % symbol is the remainder operator, also known as the ________ operator.
faust18 [17]

Answer:

It's also called the modulo operator.

6 0
3 years ago
Read 2 more answers
To delete data from a disk in such a way that no one can ever read it, you should ____.
Vlada [557]
Factory reset or install a new OS without keeping the data.
5 0
4 years ago
According to shared security model, which two are a customer's responsibilities in Oracle Cloud Infrastructure (OCI)?
sashaice [31]

Answer:

According to shared security model, a customer's responsibilities in Oracle Cloud Infrastructure (OCI) are:

1. Workloads security: The customer is responsible for protecting the work function or a distinct capacity, like a Hadoop node, a Web server, a database, or a container, that it puts on the cloud.

2. Services configuration:  The customer is also responsible for securing the specifications that describe the different aspects of its managed service.

Explanation:

Responsibilities are shared between Oracle and the customers using the Oracle Cloud Infrastructure (OCI).  Oracle is solely responsible for the security of the underlying cloud infrastructure (such as data-center facilities, hardware, and software systems), while the customer is responsible for securing the workloads and configuring their services to suit their individual needs.

8 0
3 years ago
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a d
Alecsey [184]

Answer:

Promiscuous mode

Explanation:

6 0
3 years ago
Why does it say im in middle school im a junior in highschool
Mrac [35]
I have this same problem but I’m a senior.
4 0
3 years ago
Other questions:
  • Given the following code, what is output by the method call, mystery(6 * 8)? public static void mystery (int x[]) { System.out.p
    10·1 answer
  • If you're using the paintbrush tool and want to change the color of the paint being used what should you change
    6·1 answer
  • Circular errors are caused by adding the cell name of a/an _______ cell to a formula.
    6·2 answers
  • Items that represent features of smartphones apps
    12·1 answer
  • The advancement in speed of transportation is attributed to invention of this device
    8·1 answer
  • Help fast plzzzzzzzzzzzz ​
    10·2 answers
  • Besides a backup technician, who else would have encrypted backup passwords?
    7·1 answer
  • List 10 examples of computer ethics<br>(please give even 1 if you can, I need it urgently) ​
    10·1 answer
  • Can you help me with this question please ​
    13·1 answer
  • What are some of the major issues with geotagging? What concerns you the most?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!