1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yKpoI14uk [10]
3 years ago
8

bro i got banned for posting an amazing bulk pic, but this dude literally posted an inappropriate, dafuq is wrong with this bann

ing system
Computers and Technology
2 answers:
olga2289 [7]3 years ago
7 0

Answer:

Ikr they bann the people that don't do nothing wrong

Ludmilka [50]3 years ago
5 0

Answer:

okkk

Explanation:

You might be interested in
What is the google search operator that limits results to a specific domain?
IrinaK [193]

Answer:

 Google search operator is also known as advanced operator which extend the various capabilities of the regular type of text searches. It basically contain various types of special characters and the commands.

Google search operator are very useful in the various technical and the content searches. This type of search operator also limits the result in the sites which are indexed with a specific domain and URL (User resource locator). The google search basically allow to use various symbols that are based on the operator.  

7 0
3 years ago
Kahnacademy sucksi am so mad i want to k ..<br> ill myself
ehidna [41]
No don’t do thattt ….
4 0
3 years ago
You complete your database, and the company begins using it. Shortly afterwards, two GearUp buyers, Cora and Owen, work together
Olegator [25]

Answer: Multi-user issue

Explanation: A database management system scheme can have multi-user issue when the designing of the system is not made properly. The multi user issue rises when the users concurrently access the data from the database and related error get invoked due to some reason like  repeatable reading issue, serialization, etc.

The reading problem is usually can be related to reading of the database in  uncommitted manner, uncommitted reading, repeatedly reading etc.Thus, Cora and Owen are accessing the database concurrently which can create multi-user issue.

3 0
3 years ago
"the most common way to access the internet is through ________."
liubo4ka [24]
The most common was is your phone
6 0
3 years ago
A(n) ____ is an attack that takes advantage of a system vulnerability.
jarptica [38.1K]
<span>Exploit -</span> An attack that takes advantage of a system vulnerability, often<span> due to a combination of one or more improperly configured services.</span>
8 0
3 years ago
Other questions:
  • LargeCo is planning a new promotion in Alabama (AL) and wants to know about the largest purchases made by customers in that stat
    7·1 answer
  • What is the full form of bcc please tell​
    15·2 answers
  • In order to plan George’s birthday, his father gave him a list of people who attended his birthday for the last five years. What
    8·1 answer
  • A simulation system is a technology that enables you to take over a customer’s screen, mouse, or other connected device in order
    13·1 answer
  • Project: big research project
    15·2 answers
  • Can somebody do an Algorithm 2 for more?<br> (Python)
    15·1 answer
  • Robert is risk manager at TPT Bank has been asked to implement an updated badge reader system for addressing access control risk
    8·1 answer
  • 2. Which of the following is a shortcut key to Exit from any operation?
    10·2 answers
  • When you run your Windows Form application, what is the lifespan of a global variable (also known as a "field" or "class" variab
    13·1 answer
  • Advantages of using Unicode to represent data
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!