1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
3 years ago
9

Does anyone know what episode Hinata threatens useless sakura?

Computers and Technology
1 answer:
ddd [48]3 years ago
5 0

Answer:

it was in 367 or in the 400 it was a dream that ten ten had

Explanation:

You might be interested in
How do users log into Windows 8?
bogdanovich [222]
I think it’s swipe up if i’m correct, if not sorry
5 0
3 years ago
Out of the following, find those identifiers, which cannot be used for naming Variables, Constants or Functions in a python prog
Alecsey [184]

Answer:1. Introduction to Python

1.1 A Simple Python Program

1.2 Creating and Running a Python Program

2. Virtual Data Storage

3. Statement Types

3.1 Input/Output Statements

3.2 The Assignment Statement

3.3 Control Statements

4. Another Example

5. Managing Complexity

5.1 Divide and Conquer

5.2 Using and Writing Functions

6. Object-Oriented Programming

6.1 What Is It?

6.2 Python and OOP

6.3 One More Example

6.4 What Have We Gained?

7. Graphical Programming

7.1 Graphics Hardware

7.2 Graphics Software

8. Conclusion

E X E R C I S E S

A N S W E R S T O P R A C T I C E P R O B L E M S

Explanation: I got you bruv.

7 0
3 years ago
A(n) _____ identifies how you feel about an activity or subject. computer calculator interest inventory both b and c
Alexeev081 [22]

Answer:

Interest

Explanation:

3 0
3 years ago
Read 2 more answers
Please describe how you can use the login page to get the server run two SQL statements. Try the attack to delete a record from
vekshin1
The only sure way to prevent SQL Injection attacks is input validation and parametrized queries including prepared statements. The application code should never use the input directly. ... Database errors can be used with SQL Injection to gain information about your database.
6 0
3 years ago
if you want to present slides to fellow students and co-workers which productivity software should you use to create them?
ladessa [460]

Answer:

Microsoft PowerPoint.

Explanation:

Because, it is industry standard and widely recognized and used in world.

8 0
3 years ago
Other questions:
  • Which key on a laptop keyboard is often used to help pair a mobile device with another device for communication purposes?
    12·1 answer
  • Write a program that assigns two integer values from standard input to the variables int1 and int2, then prints "true" if they a
    10·1 answer
  • When you use a script to create all of the tables for a database, you must start with the tables that don't have _______________
    15·1 answer
  • _______ can be used to prevent busy waiting when implementing a semaphore.
    15·1 answer
  • Help Asap! Marking brainliest!✨
    15·2 answers
  • Vpn stands for _____. very precise settings virtual private network virtual public network vice prestigious setup
    5·1 answer
  • What is the<br>Way to<br>keep the tool<br>Screw​
    6·1 answer
  • What are two advantages of a pay-for-use online conferencing service compared to a free service? (Choose two)
    5·1 answer
  • The memory used by the CPU to temporarily hold data while processing is called _______. random access memory central processing
    5·1 answer
  • A type of attack where the adversary intercepts network packets, modifies them, and inserts them back into the network is called
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!