1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hunter-Best [27]
3 years ago
10

Did any of you have a easter egg hunt . and have fun

English
2 answers:
Goshia [24]3 years ago
6 0

Answer:

for me I did not have it......

RSB [31]3 years ago
6 0

Answer:

I didn't have one ;-;

Explanation:

You might be interested in
"Faranheit 451": Why do you think the woman chooses to burn herself a;ong with her books? Why does this have such a powerful eff
Salsk061 [2.6K]

Answer:

The woman chose to burn herself along with her books because perhaps she would rather die than be deprived of the knowledge she was restricted if she lived. Montag saw this as shocking and sees the power the books hold over some.

Explanation:

6 0
3 years ago
Read 2 more answers
Helppp
professor190 [17]

Answer:

The main idea is about the human body and how cells and muscles work!

Explanation:

I hope this helps if it does

FRIEND ME!!!

3 0
3 years ago
Read 2 more answers
Anybody else notice its a bunch of different accounts with the same picture super weird
Tatiana [17]

Answer:

i havent seen one yet no

Explanation:

8 0
3 years ago
Read 2 more answers
Which details support the central idea that information on the Internet is not protected well enough? Check all that apply. “onl
lutik1710 [3]

The correct answers are "Only a small fraction is securely encrypted; the remainder is poorly encrypted" and "Anybody can get their hands on more information".


It is true that not all of the internet traffic is protected. About 60% of this traffic is encrypted; the rest remains a work in progress. This puts uncovered information at the risk of getting collected by able computer security technicians.

With the increasing availability of tools to simulate firewall security breaches, free to download from the internet, anybody who takes the time to learn these practices is capable of compromising unencrypted information - or even encrypted, depending on their skill.


The other options are not to be considered supportive of the central idea since:


  • The quantity of internet users is irrelevant to the fact that whether the current amount of information is at risk or not. The precautions these users take when browsing the web however, are a more contributing fact to the idea.
  • Most people do not take adequate precautions when it comes to their privacy, evidence being that the amount of personal data submitted to social networks allows their administrators to take advantage of it, selling the information to advertisers and ensuring a multi-millionaire income.
6 0
3 years ago
Read 2 more answers
HELP PLEASE WILL GIVE BRAINIEST AND FIVE STARS
V125BC [204]

On number nine, i would say the second and on ten the same thing

5 0
3 years ago
Other questions:
  • What does Homer tell us about the Phaeacians? Select all that apply. They excel all others at arms and war. They excel all other
    5·1 answer
  • a teacher should use time out on a daily basis and not look into the child's behavior and why it is occurring true or false?​
    13·2 answers
  • For a resume in the functional format, you must still include dates of employment.A. TrueB. False8) When you are including past
    6·1 answer
  • Read the excerpt from a student's essay.
    8·1 answer
  • Explain the steps that you would follow to write a news article about a national event.
    13·1 answer
  • What perspective is emphasized by the underlined phrases? that men feel a natural inclination to create art that men are most co
    8·2 answers
  • YOOOOOOOOOOO!!!!!!!!!!!!! I AM SO CLOSE TO 69 SUBS PLEASE SUB<br> HERE IT IS <br> YT: DGPLCreations
    5·2 answers
  • HELP! pls and thank u.
    13·1 answer
  • ONLY ANSWER IN YOUR OWN WORDS!!!
    5·1 answer
  • 1. What......next Sunday?<br> A.did she do B.does she do C.will she do
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!