1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
3 years ago
10

The photo shows a group of girls reacting to comments they have read about a classmate on a social media site.

Computers and Technology
1 answer:
shepuryov [24]3 years ago
3 0

Answer:

no

Explanation:

beacuse

You might be interested in
Write a java program to create and display unique three digit number using 1,2,3 and 4 also count how many three digit number ar
padilas [110]

Answer:

Answered below

Explanation:

Class Unique{

public static void main(String args[]){

int myArray[] = {1, 2, 3, 4};

int newArray[];

int i;. int j; int k;

for(i = 0; i < myArray.length; I++)

for(j = 0; j< myArray.length; j++)

for(k = 0; k< myArray.length; k++){

if(i != j && j!= k && i != k ){

newArray.add(myArray[i] + myArray[j] + myArray[k]);

}

}

int count = 0;

for(int m = 0; m < newArray.length; m++){

count++;

}

System.out.print(newArray, count)

}

}

5 0
3 years ago
Select the correct answer.
DochEvi [55]

Answer:

ask customers to use strong passwords to protect their accounts

6 0
3 years ago
Read 2 more answers
HTML tags are written inside these symbols: &lt; &gt;, which are called .
Studentka2010 [4]

Answer:

Right and left-pointing angle brackets

7 0
4 years ago
You work as the IT Administrator for a small corporate network you need to configure configure the laptop computer in the Lobby
Alika [10]

Answer:

okay if I am it administration I will port 10000

8 0
3 years ago
The Wired Equivalent Privacy standard had what significant disadvantage?
Ivanshal [37]

Answer:

Wired equivalent privacy standard has the significant disadvantages as, it is uses the static encryption keys. Wired equivalent privacy are the security and the privacy protocol which are used for designing the wireless local area network. And the static encryption key are used to set up the router for encrypting the packet in the device. The main disadvantage is that it enables the MAC address and it is easily detectable by the hackers.  

 

6 0
3 years ago
Read 2 more answers
Other questions:
  • A machine called a centrifuge is used in _____.
    8·1 answer
  • When configuring services, what linux directory typically contains server configuration files?
    8·1 answer
  • Which description of the plain text file format is most accurate?
    10·1 answer
  • What are the importance of switches in our electron device
    15·1 answer
  • I have a question involving do and for loops while using arrays.
    8·1 answer
  • Which statement best describes antivirus software?
    13·1 answer
  • Start with the following Python code.
    6·1 answer
  • Took some photos today for photography class what do you think??
    13·2 answers
  • Which option identifies the type of engineers described in the following scenario?
    6·1 answer
  • Explain briely what this statement mean.<br>"A byte is equivalent to a character"<br>​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!