1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novay_Z [31]
3 years ago
12

What's your fav show?

Computers and Technology
2 answers:
mezya [45]3 years ago
6 0

Answer:

<h3>ITS DEPENDS IF I'M INTERESTED</h3>

Explanation:

HBU?^_________^

ASHA 777 [7]3 years ago
3 0

Answer:

:D

Explanation:

ANIME

Demon Slayer Kimetsu No Yaiba (did i spell that right?)

My Hero Academia

Death Note

Aggretsuko

Wakfu

Saiki K

BNA

And The Promised Neverland!!

What are your favorites? :3

You might be interested in
a network administrator for a large oil company has discovered that a host on the company network has been compromised by an att
siniylev [52]

The action that i will recommend an immediate response to prevent further spoofing of the host is to Revoke the host's certificate.

<h3>What does revoke certificate mean?</h3>

Certificate revocation is said to be a kind of an act that connote the way of invalidating a TLS/SSL before it is said to have a scheduled expiration date.

Note that A certificate can be revoked fast when its private key depiects signs of being compromised.

Therefore, The action that i will recommend an immediate response to prevent further spoofing of the host is to Revoke the host's certificate.

Learn more about host's certificate from

brainly.com/question/14282680

#SPJ1

5 0
2 years ago
10.13 lab 10c: output range with increment of 5 write a program whose input is two integers. output the first integer and subseq
Lynna [10]

he program gives an output in increment of 5, if the first inputted integer is less than the second. The program written in python 3 goes thus

3 0
2 years ago
How do I take off the header off my second page in google docs ? ( I only need it on page 1)
iragen [17]
You cant headers are applied to every page. Apply your header under the header
3 0
3 years ago
Read 2 more answers
The most accurate readings that you can take on an analog VOM are when the meter's pointer is at the A. center scale. B. extreme
frozen [14]

<u>Answer:</u>

The correct answer option is C. near right.

<u>Explanation:</u>

The most accurate readings that you can take on an analog VOM are when the meter's pointer is near right.

There are two reasons behind this: readings towards the left end are likely to be off because of the incorrect adjustment of the zero adjust screw.

While readings at the left side may result in an inaccuracy in your reading as a smaller part of the total voltage is near the full scale.

8 0
3 years ago
So i'm trying to figure out why this code wont run can anyone help me
MaRussiya [10]

Answer:

<em><u>use</u></em><em><u> </u></em><em><u>the</u></em><em><u> </u></em><em><u>ope</u></em><em><u>ning</u></em><em><u> </u></em><em><u>and</u></em><em><u> </u></em><em><u>cl</u></em><em><u>osing</u></em><em><u> </u></em><em><u>tags</u></em><em><u> </u></em>

<em><u>[</u></em><em><u>Tex]</u></em><em><u> </u></em><em><u>[</u></em><em><u>\</u></em><em><u>t</u></em><em><u>e</u></em><em><u>x</u></em><em><u>]</u></em><em><u> </u></em><em><u>ok</u></em>

8 0
3 years ago
Other questions:
  • It is a good idea to use more than one typeface in a document when _____.
    8·2 answers
  • What is the difference between a denial-of-service attack and a distributed denial-of-service attacks? which is potentially more
    10·1 answer
  • Algorithm for converting decimal into binary.
    7·1 answer
  • What's one way to engage teens in technology?
    8·1 answer
  • A certain database has numerous tables, but they do not share any fields in common. this database will not be as powerful as oth
    15·2 answers
  • An enterprise system is a packaged software application that helps integrate various ___________ in a company.
    15·2 answers
  • Working at a ski resort in the mountains has its own unique security issues. Kenny is the chief information officer for Sundance
    10·1 answer
  • Given a int variable named yesCount and another int variable named noCount and an int variable named response write the necessar
    6·1 answer
  • Kim would like to have a simple method for entering data into a database. She should create a _____.
    14·2 answers
  • Which of the following is not true about variables
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!