1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BartSMP [9]
3 years ago
7

wooooooooo helll yeaaa made it to ACE baby now road to whatever next, lil present imma be doing You tube soon soo ideas will be

needed stay tuned
Computers and Technology
2 answers:
vichka [17]3 years ago
8 0

Answer:yo bro I don’t know but the answer is b

Explanation:

user100 [1]3 years ago
8 0

☁️ Answer ☁️

annyeonghaseyo!

Your answer is:

Uh.. good job? Keep it up ig ._.

Have a nice day hyung/noona!~  ̄▽ ̄❤️

You might be interested in
Internet Security: How can you work securely on the internet? What actions should be avoided and what are the pitfalls?
Cerrena [4.2K]

Answer:First of all, to work safely at the internet you should avoid any not secure page, and if you can’t do that, avoid entering stuff such as credit cards or passwords on this sites. Now, to work safely it’s recomendable to have a VPN(virtual private network), that hides your IP direction.

Explanation:

8 0
3 years ago
Drag the correct type of update to its definition.
Deffense [45]

Answer:

Base band : A list of radio frequencies

PRI : The chip that controls the radio frequency waves within a device

PRL: The connection between a mobile device and radio tower

Explanation:

Base-band is the range or band of frequencies. It contains a number of between upper and lower limit of the frequency. For example if the range of transmission of the signal is 2khz to 3khz. The frequencies between this range are called base band.

PRI is the chip that is used to control the different frequencies received at the device. This chip control the radio frequencies that are allowed to the devices. It is the short form of primary rate interface.

PRL is the list named as Preferred Roaming List. It has stored the information of the mobile devices that are connected to the mobile phone. This list is used while communicating between mobile device and tower.

8 0
4 years ago
Please program this in Python.
Temka [501]

lst = ["Star Wars", "Movie 2", "Movie 3", "Movie 4"]

print(lst[0])

I wrote my code in python 3.8. Best of luck

5 0
3 years ago
How to bypass securly or fortiguard (fortinet)
ira [324]

Answer:

thanks for whatever you just said!! <3

Explanation:

3 0
2 years ago
Please Help Fast!!!!!! Brainliest for First to answer!!! Conflict resolution is the process of solving disputes and disagreement
MaRussiya [10]
It's true............
8 0
3 years ago
Other questions:
  • Data mining is ______? a process of finding meaningful patterns in data to improve decisions a strategy for locating security so
    7·1 answer
  • A database stores a large amount data in vertical ___
    10·1 answer
  • Write an if-else statement for the following: If user_tickets is less than 5, assign 1 to num_tickets. Else, assign user_tickets
    15·1 answer
  • The Mark Table of Contents Entry option is used for marking nonheading text for the table of contents. the options are manually
    5·2 answers
  • Write a for loop that runs 5 times and accepts the input of an integer number every time. Those numbers will be accumulated by a
    7·1 answer
  • NEED HELP FAST timed
    13·1 answer
  • In which drawer do you find blocks that allow you to use the A and B buttons on your micro:bit?
    13·2 answers
  • State whether True / False:<br>The pause option stops the recording temporarily.*<br>True<br>False​
    9·1 answer
  • Why did industrial revolution begin Britain?​
    5·2 answers
  • Hat is the limit of virtual machines that can be connected to a virtual network?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!