1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olegator [25]
3 years ago
9

How do I mark someone brainiest

Computers and Technology
2 answers:
Sever21 [200]3 years ago
7 0

Answer:

To mark someone Brainliest you must click the crown.

Explanation:

Let me explain, in order to give a Brainliest, conditions must be met, meaning that 2 answers must be provided. But if you want to know how then first go to the answer you want to give Brainliest and scroll down to the heart and stars, to the right you will see a crown, click it and, Boom you reward the answer a Brainliest.

Hope this helps!

svet-max [94.6K]3 years ago
3 0

Answer:

when someone answers your questio correctly, you will see a red crown. Click on that and mark them the most brainiest

Explanation:

You might be interested in
____________ is using digital media safely, responsibly, and ethically.
Ronch [10]

I think it may digital citizenship

8 0
4 years ago
Read 2 more answers
MARK YOU THE BRAINLIEST!
AVprozaik [17]

1.) Over 3,000 corporations, charity groups, and government agencies reported data breaches. The majority of the accounts were exposed due to deliberate hacking, which accounted for 40% of the 5,000 occurrences.

2.) It drops By 20% within the 4 years. It goes at a steady pace then drops.

3.) It's a lot simpler. Everything, including databases, is now connected to the internet. This makes it much easier for anyone with the right skill set to access this data from anywhere in the world, with very little equipment or personnel, which is why data breaches caused by hackers are far more common than other types of incidents that would necessitate a lot more resources to access the same data.

4.) Another day, hackers claim responsibility for yet another big data leak. A hacker organization known as ShinyHunters said that it was auctioning 70 million sets of sensitive data reportedly obtained from AT&T only days after a breach at T-Mobile exposed roughly 53 million people's personal information. They are also interested in credit cards. If this trend continues, our social security and life will be jeopardized.

5.)Financial and payment systems have evolved over thousands of years, despite the fact that they are typically regarded of as new phenomenon. Over that time, the way transactions are carried out has changed dramatically, but the core goals have not. For instance, the economic tasks performed by Renaissance Italy's first modern banks are still relevant today.

Hope this helps took a while lol :)

4 0
2 years ago
What is wrong with each of the following code segments? int[] values; for (int i = 0; i < values.length; i++) { values[i] = i
tino4ka555 [31]

Answer:

values have been declared but not initialized nor allocated memory. So you are not allowed to use "values.length"

7 0
3 years ago
You can use the results from a search on a database in all of these ways except to ____.
Oksanka [162]
<span>Hello </span><span>Savonahdeedss4938
</span><span>

Answer: You can use the results from a search on a database in all of these ways except to create records


Hope this helps
-Chris</span>
4 0
3 years ago
Read 2 more answers
Do you think Mortal Combat is cool?
Sergeu [11.5K]

Answer:

yes

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • Gross Domestic Product is equivalent to which of the following?
    13·1 answer
  • Which option allows you to link to a specific slide in another presentation?
    15·1 answer
  • This type of handout prints only the text of the presentation.
    7·1 answer
  • Informatyka klasa 7 daje naj
    10·1 answer
  • Declare an array named tax rates of five elements of type double and initialize the elements (starting with the first) to the va
    12·1 answer
  • While inserting images, the Picture command is usually used to insert photos from a digital camera, and the Clip Art command is
    7·2 answers
  • When each line of text hits the margin at the same point what is the text?
    8·1 answer
  • Write a recursive method called printNumPattern() to output the following number pattern.Given a positive integer as input (Ex:
    13·1 answer
  • While checking your work e-mail, you have received an e-mail warning you about a virus that is currently doing the rounds. What
    8·1 answer
  • _____________ do not contribute to effective group work.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!