1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masya89 [10]
3 years ago
12

James root lol ........................

Computers and Technology
1 answer:
miv72 [106K]3 years ago
8 0

Answer:

sickk

Explanation:

You might be interested in
Modify the FitnessTracker class, created in Chapter 4 Programming Exercise 3AB, so that the default constructor calls the three-
Ivenika [448]

Answer:

Is this coding?

Explanation:

5 0
3 years ago
Test prints can help you determine the exposure time for a print as well as help you identify any issues in the negative. True F
Dahasolnce [82]
I'd say TRUE

It is always important to have a correct exposure in rendering a highlight tone on a print. To find the correct highlight exposure, make test strips using pieces of paper separately to the area of the negative containing the most the most critical highlight. Once you have enough test strips, you should pick the one that contains the best highlight rendering. Exposure time of that test strip is the correct exposure.



5 0
3 years ago
Read 2 more answers
What term refers to a hacker that uses
miss Akunina [59]

Answer:

Hacktivist

Explanation:

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof- service attacks.

5 0
2 years ago
__________ is a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing oth
8_murik_8 [283]

Answer: email

Explanation:

7 0
4 years ago
Something that requests data from a server is known as a ____.
rosijanka [135]

Answer:

It is  called a client.

Explanation:

Any entity that request data from a centralized node in a network (which is called a server, because once received a request, it replies sending the requested piece of data back to the requester) is called a client.

The server can adopt different names based on its role: It can be a file server, an application server, a web server, a mail server etc.

This sharing information paradigm, where the resources are located in one host (server) to be distributed to many hosts (clients)  is called client-server model.

3 0
3 years ago
Other questions:
  • What is basic function of an operating system?
    10·2 answers
  • Which of the following best describes cost-benefit analysis?
    9·1 answer
  • Use the AND function with appropriate arguments in cell H11 to determine if there is a force out at third base. There is a force
    14·1 answer
  • In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
    13·1 answer
  • Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP netw
    12·1 answer
  • What in the world is this for and how do you use it
    8·2 answers
  • What is said to be the first mechanical calculator​
    7·2 answers
  • Hello! Please Answer This One Question!<br><br>Write a 50-word summary about Digital Citizenship
    10·1 answer
  • use c , c, java or python (any one) programming language for the following programming exercises. do not call built-in library f
    9·1 answer
  • your organization has decided to use dhcp for ipv6. you want all windows 10 systems using ipv6 to get all of their tcp/ip inform
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!