1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
7

Any single girls 12-14 im a 13 yo boy idc if this aint a dating site

Computers and Technology
2 answers:
zysi [14]3 years ago
8 0

Answer:

this has turned into a dating appppp

Explanation:

have a good day

-BARSIC- [3]3 years ago
5 0

Answer:

THIS AN'T DATING APP

Explanation:

THIS IS THE ONE THE ONLY

BRAINY

You might be interested in
You are requesting information about wireless connectivity for your workplace computers. Because you expect the information to b
Sophie [7]

Answer:

the options to the question is:

a.In the introduction

b.In the body

c.In the conclusion

d.In the post script

Explanation:

The answer is A.

The letter would be better suited to have the request placed in the introduction as the introduction will give a brief of what the letter is all about.

The request cannot be in the body of the letter as the body of the letter is structured to contain the details about the request.

The request cannot be in the conclusion as the conclusion part of the letter is the ending part and it is more of a summary, rounding off the letter.

The request cannot be in the Post Script section of the letter as the post script is used to add additional information or detail to a letter.

5 0
3 years ago
What are the challenges of Cyber Law???? Needed ASAP ​
lilavasa [31]

Answer:

Explanation:

Few challenges that the technology space faces in cyber security are the following:

Digital Data Threat: Growing online transactions generate bigger incentives for cybercriminals. Besides, establishments looking to mine data—for instance, customer information, results of product surveys, and generic market information—create treasured intellectual property that is in itself an attractive target.

Supply Chain Inter-connection: The supply chains are increasingly interconnected. Companies are urging vendors and customers to join their networks. This makes a company’s security wall thin.

Hacking: This action is penetrating into someone’s system in unauthorized fashion to steal or destroy data, which has grown hundred folds in the past few years. The availability of information online makes it easier for even non-technical people to perform hacking.

Phishing: The easiest to execute and can produce the results with very little effort. It is the act of sending out Fake emails, text messages and create websites to look like they're from authentic companies.

6 0
3 years ago
What happens if you have you an image that has 6 bits-per-pixel and you change it to 12
Bingel [31]

Answer:I don't know

Explanation:

6 0
3 years ago
18. WHICH MENU WOULD MOST LIKELY ALLOW YOU TO ADJUST YOUR LINE SPACING? *
Natali [406]

Explanation:

FORMAT

because it is used for the general appearance of the page

6 0
2 years ago
What is a set of javascript statements that result in an action?
AlexFokin [52]

function is the right answer because function is a block of code designed to perform a particular task

4 0
3 years ago
Other questions:
  • Respond to the following in a paragraph of no less than 125 words. What is the purpose of netiquette guidelines?
    10·1 answer
  • Which device lets you hear audio on your computer?
    12·2 answers
  • Declare a character variable letterStart. Write a statement to read a letter from the user into letterStart, followed by stateme
    12·1 answer
  • The ash and dust from a volcanic eruption can cause a _______ change in the environment.
    13·1 answer
  • What do character formats do for your document's message? A. Set how text aligns within a document B. Provide organization C. Pr
    6·2 answers
  • There is usually a positive side and a negative side to each technology improvement. Select a technology you use every day and c
    5·1 answer
  • Help giving points mark BRAINLEST
    5·1 answer
  • What is a cookie? *
    9·2 answers
  • Heyyyyyy who likes anime​
    12·2 answers
  • if a user watches a video with event tracking three times in a single session, analytics will count how many unique events?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!