1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zielflug [23.3K]
3 years ago
14

HEYY GUYS START REPORTING ALL THE SPAMMERS PLSS!!!!! For the spammers, I hope you go to hell >:c!!!!!!!!!!!

Computers and Technology
1 answer:
Molodets [167]3 years ago
4 0

Answer:

i totally agree

Explanation:

You might be interested in
You want to multiply 50 in cell D3 by 8.90 in cell E3. Which formula should you use?
Effectus [21]

Answer:

The formula is =D3*E3

Explanation:

To multiply the items in 2 cells, the formula like every other in excel begins with = .

to multiply 50 in cell D3 by 8.90 in cell E3 the formula to be used is

=D3*E3

This will multiply the numbers in both cell and show as 445.

7 0
4 years ago
When working with arrays, most programming languages perform ________, which means they do not allow programs to use invalid sub
Allisa [31]

Answer:

The answer is "Option 2"

Explanation:

In the given question the answer is "array bounds checking", It Checks the limits by providing a way, that Specifies whether a value is inside those limits has been used. It is a variable, that falls into a given class or function called as an array index of array, that's why all option are wrong, that is explained as follows:

  • In option 1, It uses provides security, that's why it is wrong.
  • In option 3, It works on the bits, that's why it is not correct.
  • In option 4, It uses two thing that is "array bound checks and sub-script of bond", that's why it is wrong.

8 0
3 years ago
5. Bits are sent over a communications channel in packets of 12. (a) If the probability of a bit being corrupted over this chann
user100 [1]

Answer:

0.889

Explanation:

7 0
4 years ago
Feistel proposed that we can approximate the ideal block cipher by utilizing the concept of a __________ cipher, which is the ex
sweet-ann [11.9K]

Answer:

product cipher Is the answer

5 0
2 years ago
Read 2 more answers
Give three reasons to use a hard drive as mass storage.
serious [3.7K]

Answer:

Every computer – whether it's a tower desktop or laptop – is equipped with an internal hard drive. The hard drive is where all your permanent computer data is stored. Whenever you save a file, photo, or software to your computer, it's stored in your hard drive

Explanation:

Backups and Archives. ...

Media Libraries. ...

Large Capacity Storage. ...

NAS Drives and Security. ...

RAID Arrays. ...

Other Uses.

8 0
3 years ago
Other questions:
  • Query: [mcdonalds Austin] Viewport: Fresh User Location: within Houston, TX Result Returned: McDonalds location in a neighboring
    7·1 answer
  • Why should you stay out of the open space to the right of a semi-tractor-trailer?
    7·2 answers
  • Text messaging is an example of nonverbal communication. Please select the best answer from the choices provided. T F
    7·2 answers
  • Which of the actions below will not create more room on your hard drive?
    13·1 answer
  • Which of the following represents the biggest difference between asymmetric and symmetric cryptography?
    9·1 answer
  • Clunker Motors Inc. is recalling all vehicles from model years 2001-2006. Given a variable modelYear write a statement that prin
    9·1 answer
  • The spreadsheet below shows the age, grade level, major, and minor of four students in college. A purple background in the
    5·1 answer
  • How do mass and social media differ
    8·1 answer
  • What is the most used piece of technology in education?
    13·1 answer
  • You are tasked with designing an airplane that could carry a very large load of cargo. What type of airfoil would you use for th
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!