1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nostrana [21]
3 years ago
11

Which is an example of emoticon use?

Computers and Technology
1 answer:
Elina [12.6K]3 years ago
8 0
I think it’d be answer B
(I do psychology and it’s kind of similar to this)
You might be interested in
What is a commonly publicized password sql injection string?
aleksley [76]
The strings "or 1=1" and ""or ''=''"  can be commonly used to trick an SQL WHERE clause into becoming true.

So if you specify <span>' or ''=' as a password, you can log in if the query string would be:

</span><span>select username,pass from users where username='you' and password='' or ''='<span>' limit 0,1;</span></span>
7 0
4 years ago
ConnectWeb, Inc., an Internet service provider (ISP), supplies information to the Federal Trade Commission concerning possible u
Yuki888 [10]

Answer:

A Safe Harbor

Explanation:

ConnectWeb, Inc., an Internet service provider (ISP), supplies information to the Federal Trade Commission concerning possible unfair or deceptive conduct in foreign jurisdictions. For this disclosure, federal law gives ConnectWeb and other ISPs immunity from liability. This is a Safe Harbor.

5 0
3 years ago
____ a program means writing down in a prescribed manner the instructions for using the program, the way in which the program pe
Vlada [557]
The answer is d labeling
7 0
3 years ago
How many bytes make one kilobyte?​
vesna_86 [32]

Answer:

1000 bytes in 1 kilobyte

Explanation:

Its just fax

8 0
3 years ago
Read 2 more answers
What problem can enabling compression present when you are using ssh to run remote X applications on a local display?
fgiga [73]

Answer:

Compression over ssh connection would increase network latency, using most of its bandwidth to crippling network efficiency.

Explanation:

SSH is a protocol in computer networking used by administrators to manage a remote network. Various commands are run remotely with this connection. The compression command is enabled in the remote network with the -C option in the ssh configuration. Compression over ssh is only favorable over low bandwidth networks.

5 0
3 years ago
Other questions:
  • This program will convert a set of temperatures from Fahrenheit to Celsius and Kelvin. Your program will be reading in three dou
    11·1 answer
  • Which of the following companies develop, own, and provide travel products for people?
    8·1 answer
  • Some of the users in your company create and delete so many files that they have problems with fragmented disks. Which of the fo
    5·1 answer
  • Using a single formatting _______ helps to make reading researched information easier; it lets the reader know what to expect.
    7·1 answer
  • The ‘capacity for emergency management and response personnel to interact and work well together’ describes which of the key com
    10·2 answers
  • You are a database administrator. Chantelle comes to you asking for help on how to access all the data in one row of the databas
    11·1 answer
  • Maximum number of character symbols represented by Unicode
    6·1 answer
  • Why might you use a navigation form instead of tab pages? The navigation form allows for several levels and sublevels to be coll
    7·2 answers
  • What are the cons of using keyboard shortcuts?
    12·1 answer
  • A computer hacker trying different combinations of characters to crack a password is a ________.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!