1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
7

Any single girls 12-14 im a 13 yo boy idc if this aint a dating site

Computers and Technology
2 answers:
zysi [14]3 years ago
8 0

Answer:

this has turned into a dating appppp

Explanation:

have a good day

-BARSIC- [3]3 years ago
5 0

Answer:

THIS AN'T DATING APP

Explanation:

THIS IS THE ONE THE ONLY

BRAINY

You might be interested in
____ of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation
umka21 [38]

Answer:

b. Acceptance

Explanation:

<em>"Acceptance </em><em>of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation.  </em><em>"</em>

<em>Acceptance Control </em>is important as a strategy when an organization has accomplished a determined level of risk, or it has estimated potential damages that might happen due to attacks, or the organization has developed a thorough analysis related to cost benefits, or it has also evaluated the probabilities of attacks.

7 0
3 years ago
The Research and Development Process has five steps what are they ?
valentina_108 [34]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

There are five steps used in any research and development project.

Step 1 – Locating and Defining Issues or Problems and get an idea about what is needed

Step 2 – Designing the Research Project, How you will solve the problem or get the solution of the problem

Step 3 – Collecting Data.

Step 4 – Interpreting Research Data.  

Step 5 – Report Research Findings.

3 0
3 years ago
Which of the following statements is the least abstraction of the world wide web
Sliva [168]
<span>Documents, images and other data you can access by providing a uniform Resource Locator. URL - the Web Address

I hope this helps. You didn't give me the choices to from.  </span>
8 0
4 years ago
Read 2 more answers
Exercise 2.14.4: Geometry 2.0
d1i1m1o1n [39]

Answer:

Explanation:

One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.

Fill a rectangular baking glass dish with water.

Place a plastic bag with ice in the water near the left edge of the dish.

Place a lighted lamp near the left edge of the dish so that its light falls directly on the plastic bag.

Put a few drops of ink in the water.

The student did not observe any circulation of ink in the water as expected because the experiment had a flaw. Which of these statements best describes the flaw in the experiment? (2 points)

Not enough ink was added.

Not enough water was taken.

The dish was too small for the experiment.

The lamp and the ice bag were at the same place.

3 0
4 years ago
True or false? If you’re posting the same content across different channels, make sure you post them simultaneously—on the same
alukav5142 [94]

Answer:

The answer is true.

Explanation:

7 0
3 years ago
Other questions:
  • I need help making a survey for highschool students in my school any topics/questions?
    9·1 answer
  • You have been employed as a technical consultant to a computer shop chain. You are given the task of creating a short consumer b
    12·1 answer
  • Which of the following would most likely be responsible for configuring firewalls and IDPSs, implementing security software, and
    8·2 answers
  • Which of the following statements is correct?
    14·1 answer
  • If you want to learn more about a command, point to its button and wait for the ____ to appear.
    13·1 answer
  • Open Comments.java and write a class that uses the command window to display the following statement about comments:
    8·1 answer
  • The assignment symbol can be combined with the arithmetic and concatenation operators to provide augmented assignment operations
    11·1 answer
  • A program uses two classes: dog and poodle. which class is the base class and which is the derived class?
    7·2 answers
  • A Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with one of the na
    14·2 answers
  • Before her shift as a cashier at the grocery store, Carla pulls her hair back into a ponytail and makes sure her fingernails are
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!