1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novay_Z [31]
3 years ago
12

What's your fav show?

Computers and Technology
2 answers:
mezya [45]3 years ago
6 0

Answer:

<h3>ITS DEPENDS IF I'M INTERESTED</h3>

Explanation:

HBU?^_________^

ASHA 777 [7]3 years ago
3 0

Answer:

:D

Explanation:

ANIME

Demon Slayer Kimetsu No Yaiba (did i spell that right?)

My Hero Academia

Death Note

Aggretsuko

Wakfu

Saiki K

BNA

And The Promised Neverland!!

What are your favorites? :3

You might be interested in
After this week im gonna be moderator who ever needs help let me know
Sav [38]

Answer:

ok

Explanation:

thanks, for offering help through here. Have a nice day.

4 0
3 years ago
Which of the following enable unauthorized access to your network, and by extension, the sensitive documents, proprietary code,
oksano4ka [1.4K]

Answer:

(a) Weak passwords

Explanation:

Typically, a password is weak if it is easily discovered by all persons including unauthorized users. When passwords to a network are weak, the network is vulnerable to unauthorized access and may permit access to proprietary code, accounting files and other sensitive documents in the network.

Examples of weak passwords are;

i. those generated from the name of a user.

ii. those generated for a user by default.

iii. those generated from words from dictionary or other similar materials.

iv. those that don't include a combination of letters and numbers and even symbols.

v. those that are short in length e.g less than 8 characters.

3 0
3 years ago
Read 2 more answers
Computers have small bumps on the keyboards that enable persons to type without looking at the keyboard. These letters are:
QveST [7]

A) FJ is the right answer

3 0
3 years ago
Read 2 more answers
Your son is complaining that his smartphone is broken. He tells you that he cannot connect to the internet, nor can he make or r
ycow [4]

Answer:

the correct and only reasonable answer is option B

3 0
2 years ago
Which charts plot data in columns and rows? Check all that apply.
Elis [28]

Answer:

bar

column

line

Explanation:

i took it and it was right

8 0
3 years ago
Other questions:
  • A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
    12·1 answer
  • Write the name of the tab, the command group, and the icon that you need to use to justify
    14·1 answer
  • <img src="https://tex.z-dn.net/?f=6.372%20%5Ctimes%2075%20find%20the%20product" id="TexFormula1" title="6.372 \times 75 find the
    6·1 answer
  • Which programming element is used by a game program to track and display score information
    12·2 answers
  • How many nibbles make one kilobyte​
    7·2 answers
  • Edhesive 7.6 lesson practice python
    11·1 answer
  • Class 10 computer unit 1 all excersise​
    12·1 answer
  • Difference between centralized and decentralized processing in computer
    7·1 answer
  • Imagine that you are creating a website for a client. How will you interact with the client, gather requirements, and update the
    7·2 answers
  • Pls help me po:{<br><br> I need the answer lang po talaga , pls:{
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!