1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka94
3 years ago
9

If u play codm pls tell me ur username

Computers and Technology
2 answers:
k0ka [10]3 years ago
6 0

Answer:

NAIZ211

Explanation:

Nonamiya [84]3 years ago
5 0

extremely bad game lol

You might be interested in
You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you r
Irina-Kira [14]

Answer:

A. True.

Explanation:

In this scenario, you are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19): Protecting Whistleblowers with Access to Classified Information.

In USA, the Presidential Policy Directive 19 (PPD-19) which was signed by President Barack Obama in October 2012, is an executive order designed to provide significant protection for an employee who have access to classified informations such as fraud, waste of money and abuse or prohibiting any form of retaliation against this cleared employee.

3 0
3 years ago
What does Nicholas Carr suggest in his article "Is Google Making Us
Aleksandr-060686 [28]

Answer:

I believe the answer would be C

Explanation:

3 0
3 years ago
Which factors have increased the need for the latest cybersecurity technologies?
coldgirl [10]

The factors have increased the need for the latest cybersecurity technologies are A. smaller targets, C. customized threats.

<h3>What are the cybersecurity?</h3>

Cybersecurity is the safety of internet-related structures which include hardware, software program and records from cyber threats. The exercise is utilized by people and organizations to defend towards unauthorized get admission to to records facilities and different automated structures.

Cyberattacks can goal a huge variety of sufferers from character customers to organizations or maybe governments. When focused on groups or different organizations, the hacker's aim is normally to get admission to touchy and precious enterprise resources, which include highbrow property (IP), client records or price details.

Read more about the cybersecurity technologies:

brainly.com/question/26260220

#SPJ1

7 0
2 years ago
Which CSS property configures the font typeface?
Vitek1552 [10]
The answer to this is font-family.
Example of usage:
```
<em>#headerFont{</em>
<em>   font-family: Times New Roman;</em>
<em>}
</em>
```
You can put your font name in quotes <em>(eg: "Ariel")</em> but it's not always necessary- but it is a good practice to get into because it helps to avoid certain fonts not being able to show up. Please note there are some fonts that will not work in certain browsers.

   If you choose a custom font ether you made or you downloaded, unless you have the font itself saved into your code, unless the user has that font on their end, they will <em>not</em> see it- this is where backup fonts are helpful until or using universal ones; at least until you learn how to integrate the font fully into your website.
5 0
3 years ago
The primary function of the average command is what?
Blababa [14]
The primary function of the average command is the:


Answer: 

Aligning Anchor Points
4 0
3 years ago
Other questions:
  • Which loan type requires you to make loan payments while you’re attending school?
    10·1 answer
  • In three to five sentences, describe how technology helps business professionals to be more efficient. Include examples of hardw
    10·1 answer
  • A service provider, hardware, and web browser are needed to connect to __________.
    8·2 answers
  • A structure that specifies which of a number of permitted data types (e.g. integers) that may be stored in its instances is:
    6·1 answer
  • What types of storage can be used to access your data on a another computer
    15·1 answer
  • HELP asap please... ​
    13·1 answer
  • What is the definition of posture<br>​
    7·1 answer
  • You are sending Secret information to a colleague located at another office. You want to give him some background information an
    15·1 answer
  • he wants to customize the operating system to meet his needs. what types of tools should he use, and what can he do with each?
    6·1 answer
  • How can you create a messages to look like an IMessage?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!