1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anestetic [448]
2 years ago
12

HURRRY WILLL GIVE BRAINLIST!!!!!!

Computers and Technology
1 answer:
Flura [38]2 years ago
8 0

Answer:

true

Explanation:

the best way to learn is take notes eaverytime

some one trying to teaching you some

You might be interested in
The following statement calls a function named half, which returns a value that is half
nadezda [96]

Answer:

function half(number) {

     let result = number/2;

     return result;

}

Explanation:

4 0
3 years ago
____ are the in-house equivalent of Internet newsgroups. They use Web- or software-based discussion tools that are available acr
antiseptic1488 [7]
<span>The correct answer is Intranet chat rooms</span>
8 0
2 years ago
Assslainsdffddsvvdesdssbhasasco5m
alexandr402 [8]
Hahahahaha I wanna was the day I wanna was the last time I got to
8 0
3 years ago
Read 2 more answers
When you’re upset, you’re __ to get into a crash compared to when you’re not upset
Daniel [21]

Answer:

Your answer would be more likely.

Explanation:

When someone is upset and they are driving they usually have their music baring and the they can't hear their surroundings and all they can think about is what they are upset about so therefor they don't pay attention. Hope this helped! Have a great day! :)

7 0
3 years ago
Who developed one of the first mathematical models of a multilevel security computer system?
svp [43]

Answer:

C. Bell and LaPadula

Explanation:

The first mathematical models of multilevel security computer system was developed by Bell and Lapadula. Their full names are David Elliot Bell and Leonard J. Lapadula. Their model used to define the concept of modes of access,secure state machine and outlined the rules of access.

6 0
3 years ago
Other questions:
  • A powerpoint ________ is a set of unified design elements.
    5·1 answer
  • When choosing a new computer to buy, you need to be aware of what operating _____ a0 it uses.
    6·1 answer
  • 2. Add a _______ to manually force text from one page to the next page. A. footer B. page break C. blank page D. header
    11·2 answers
  • Jax needs to write a block of code that will organize a list of items alphabetically. Which function should he use? append() pri
    12·1 answer
  • How read binary file in c++
    7·1 answer
  • What option is used to combine several objects so that they can be treated as a single unit
    6·1 answer
  • What type of encryption is this "1d83ad29cf19ff399445aff3a0da74d9"
    5·1 answer
  • Determine the number of cache sets (S), tag bits (t), set index bits (s), and block offset bits (b) for a 1024-byte 4-way set as
    5·1 answer
  • When a hoverboard's battery dies, does the hoverboard battery life get impacted the next time the battery is full?
    12·1 answer
  • When you sign in to your Microsoft account with another Windows device, your settings will appear very differently than they do
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!