1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
3 years ago
13

G i r l s o n l y j o i n id= ons jcuv jke

Computers and Technology
2 answers:
Scilla [17]3 years ago
5 0
At least 20 characters long
Katyanochek1 [597]3 years ago
4 0

Answer:

nooooooo

1.1431586352

You might be interested in
How does the game Clash Royale keep players continuously active and engaged?
lana [24]

Answer: a

Explanation: because they have to beat and check the players to move on

4 0
3 years ago
​Five elements that can prove the genuineness of a user. What you know, what you have, what you are, what you do, and where you
nataly862011 [7]

Authentication factors are the factors that describe about the ingenuition or origination of the user. This is the tag that tells about the actuality of user that is getting connected with internet by the five elementals.

Hope this helps!

8 0
3 years ago
The Gramm-Leach-Bliley Act contains a rule that ensures security and confidentiality of customer information, protects against a
ValentinkaMS [17]

Answer:

b. The Safeguards Rule

Explanation:

According to a different source, these are the options that come with this question:

a. The Information Assurance Rule

b. The Safeguards Rule

c. The Safety Rule

d. The Guardian Rule

This rule is called the <em>Safeguards Rule</em>, and it comes from the Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999. This is an act of Congress signed by President Bill Clinton that removed barriers among banking companies, securities companies and insurance companies. This meant that organizations such as commercial banks, investment banks, securities firms, and insurance companies were able to consolidate.

7 0
3 years ago
Read 2 more answers
What are the letter that go under each note?
gladu [14]

Answer:

A, B, C, D, E, F, G pls mark me brainliest see explanation below

Explanation:

those are the letters if you search up letters for music you can find them way easier than me explaining and you will also learn faster. please mark me brainliest

5 0
2 years ago
Read 2 more answers
A communication sent through Transmission Control Protocol (TCP) arrives out of order. What allows the data to be put back toget
algol13

Answer:

Error detection.

Explanation:

Tcp is a transport layer protocol. It is said to be connection oriented because it requires a handshake or established connection between the sender and the receiver.

Once a handshake is made, the segments of the packets are sent across and the connection is closed.

The error detection does not only carry out integrity checks, but allows for sequence numbering from the sender to receiver. If the packets arrives out of order, the sequence numbers are used to arrange them in the correct order.

5 0
2 years ago
Other questions:
  • in a management information system, the quality of information is determined by its usefulness to users, and its usefulness dete
    8·1 answer
  • I need someone to transfer this into a database in excel Please help :D 7 pts
    15·1 answer
  • 27. List four advantages of Computer Aided Design over traditional hand
    10·1 answer
  • "Write an iterative function iterPower(base, exp) that calculates the exponential baseexp by simply using successive multiplicat
    10·1 answer
  • David owns a retail business that just implemented a web app to supplement sales. He needs to choose an attribution partner to i
    15·1 answer
  • Explain why the fundamental software engineering principles of process, dependability, requirements management, and reuse are re
    15·1 answer
  • If I write too much for an exam answer, do I get downgraded?
    7·1 answer
  • Give me facts on john john son
    7·1 answer
  • How to block admin on school chromebook managed by admin
    9·2 answers
  • Cui documents must be reviewed to which procedures before destruction?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!