1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maksim231197 [3]
3 years ago
6

Only people who have nitrotype answer this question!!!

Computers and Technology
2 answers:
GenaCL600 [577]3 years ago
8 0
^^^what they said lol
grigory [225]3 years ago
3 0

Answer:

Krampus 4k Nitrotype team- VVIXEN

You might be interested in
Ask the user for five-coordinate pairs. Store each pair as a tuple, and store all the pairs in a list. Print the slope between a
Margaret [11]

Answer:

y=(1/2) x+3

Explanation:

8 0
3 years ago
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
Which three staements about gravity and the formation of the solar system are true?
Yuliya22 [10]

Answer:Gravity held the pieces of forming planets together. Gravity pulled most of the matter into the center of the solar system Gravity caused the planets and Sun to have spherical shapes.​

Explanation:

7 0
3 years ago
Victor has been murdered, and Art, Bob, and Carl are suspects. Art says he did not do it. He says that Bob was the victim's frie
-BARSIC- [3]

Answer:

Bob

Explanation:

we can use symbolic reasoning to prove that Bob is not innocent without enumerating all of the cases.

6 0
3 years ago
Hi I need help with an assignment. We're learning about encryption and decryption in code.org. i need help with three of the tex
MrMuchimi

Answer:

multiply divide and add

7 0
3 years ago
Other questions:
  • Write a program that reads in two integers typed on the keyboard and outputs their sum, difference, and product.
    12·1 answer
  • You knew that you had to take this quiz so you logged into Blackboard and went to the quizzes section. In this scenario your com
    11·1 answer
  • my headphone jack that is like in the computer will not work only my speakers will work when i plug in
    15·2 answers
  • Jimmy wrote the procedure scoreToGrade which accepts as a parameter score - a quiz score in the range 0-100. The procedure is su
    8·1 answer
  • Because collecting the adjustment data requires time, the adjusting entries are often a.estimated and recorded earlier than the
    8·2 answers
  • You can invoke or call a method from another program or method. When methods must share data, you can pass the data into and ret
    6·1 answer
  • 1. PGP encryption can be performed from the command line as well. What is the PGP command line syntax to encrypt the my-message.
    7·1 answer
  • Treat others the way
    5·2 answers
  • Why do i keep losing points in brainly.com and how do you lose it?
    8·2 answers
  • Priortization is an example of a skill that helps you reach long term goals because
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!