1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ludmilkaskok [199]
3 years ago
11

Tell me 5 jokes. its for my comdey class

Computers and Technology
1 answer:
Lubov Fominskaja [6]3 years ago
7 0
If you have 13 apples in one hand and 10 oranges in the other, what do you have?

Big hands.

You might be interested in
Lorann sends messages to Aiden that always go into Aiden's Junk E-mail folder. Which process would best correct this problem so
BaLLatris [955]
Go to settings and find out.
7 0
3 years ago
guys im so heartbroken. so i quit art. heres my laST piece of art i did. it took me a month. im burning it tonight. i quit art..
Helga [31]

Answer:

Ok

hsjsbsjwiqnsbsjsowiwi

5 0
3 years ago
Read 2 more answers
Before hard disk drives were available, computer information was stored on:
kobusy [5.1K]
Floppy disks . is the answer
6 0
4 years ago
write a python program to find all words in a string which are at least 6 characters long and starts with a capital ‘a’ or small
lawyer [7]

Answer:

. Write a Python program to check that a string contains only a certain set of characters (in this case a-z, A-Z and 0-9)

Explanation:

. Write a Python program to check that a string contains only a certain set of characters (in this case a-z, A-Z and 0-9)

3 0
2 years ago
The people who perform jobs and tasks are part of which factor of production?
wel
The answer is D. Labor
7 0
3 years ago
Other questions:
  • A program is run line by line to determine the source of a logic error. Which best describes the specific tool being used? (A.)c
    5·1 answer
  • Reserve space in memory for a variable called UIN of size word. The initial value of UIN will be the sum of the digits in your U
    6·1 answer
  • Acomputer with a domain name is called a
    8·1 answer
  • Inherent flaws in system software code are called:
    7·1 answer
  • Balance is the design principle that is represented when using the Crop tool?
    6·1 answer
  • Comments should be written in what type of language
    6·1 answer
  • Third party providers of publicly available data sets protect the anonymity of the individuals in the data set primarily by a. R
    6·1 answer
  • One side in a Transmission Control Protocol (TCP) connection has not been able to properly recover from a series of malformed se
    6·1 answer
  • A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.
    10·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!