1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa [10]
2 years ago
6

Look at the pic. I know what girls be going through like us girls aren't toys. Please stop, please.

Computers and Technology
2 answers:
myrzilka [38]2 years ago
8 0

Answer:

This irritates me why are people like that

Explanation:

we are people not your toys and not your tools

props to any guy that see women as we are

mixas84 [53]2 years ago
6 0

Answer:

No need to be overly-sensitive, brainly deleted that question

If no one joins then its not a problem

You might be interested in
How are clustering and Network Load Balancing similar?
Elza [17]

Answer:

Load balancing is the mechanism happening between the different components to achieve the aim independently in the server. They are not aware of the presence of the other resources with them.

Clustering is the process in which the components work to gain the desired results in the form of group.They work in group so that there are no chances of crash  in server.

The similarity arises between these two process are :

  • They have capability to work even after failure of system
  • Can have unnecessary access to the information
  • Scalable

5 0
3 years ago
IMPORTANT!!<br><br> How can you get real answer keys for edmentum (plato) courses as a student?
dimulka [17.4K]

Answer:

Looking up the answer on google works but in my experience if you put the whole question onto brainly then look for the one with the best stars and most then the answer will be correct, thats how i have 100% on all my assingments, sorry if this isnt the answer you wanted but it helps

Explanation:

4 0
3 years ago
Compare Fibonacci (recursion vs. bottom up)
ipn [44]

Answer:

C++ code explained below

Explanation:

#include<bits/stdc++.h>

#include <iostream>

using namespace std;

int FiboNR(int n)

{

int max=n+1;

int F[max];

F[0]=0;F[1]=1;

for(int i=2;i<=n;i++)

{

F[i]=F[i-1]+F[i-2];

}

return (F[n]);

}

int FiboR(int n)

{

if(n==0||n==1)

return n;

else

return (FiboR(n-1)+FiboR(n-2));

}

int main()

{

long long int i,f;

double t1,t2;

int n[]={1,5,10,15,20,25,30,35,40,45,50,55,60,65,70,75};

cout<<"Fibonacci time analysis ( recursive vs. non-recursive "<<endl;

cout<<"Integer FiboR(seconds) FiboNR(seconds) Fibo-value"<<endl;

for(i=0;i<16;i++)

{

clock_t begin = clock();

f=FiboR(n[i]);

clock_t end = clock();

t1=double(end-begin); // elapsed time in milli secons

begin = clock();

f=FiboNR(n[i]);

end = clock();

t2=double(end-begin);

cout<<n[i]<<" "<<t1*1.0/CLOCKS_PER_SEC <<" "<<t2*1.0/CLOCKS_PER_SEC <<" "<<f<<endl; //elapsed time in seconds

}

return 0;

}

7 0
2 years ago
Colleen has been missing a lot of work. She often calls in right as her shift is starting with some excuse about why she
yanalaym [24]
She is not showing honesty
5 0
2 years ago
Read 2 more answers
The type of software used widely in businesses to complete specific tasks is _____. application software programming language sy
max2010maxim [7]
It is eather pythone or html
8 0
3 years ago
Read 2 more answers
Other questions:
  • The ____________ is a wildcard character that is used to search for an unknown single character.
    6·1 answer
  • A very simple device that connects network components and sends packets of data to all other connected devices is called a _____
    5·1 answer
  • Jennifer recently bought a new computer to type a new manuscript she’s been working on. She also stored a lot of movies on it to
    10·1 answer
  • What command prompts should be used to assign an IP address to:
    9·1 answer
  • Which guideline should you use when downloading software from the Internet?
    15·1 answer
  • How to understand amortized analysis potential?
    12·1 answer
  • Multiple arrays. Jump to level 1 For any element in keysList with a value greater than 40, print the corresponding value in item
    7·2 answers
  • What icon is usually used to indicate an attachment feature?
    14·2 answers
  • What is the difference between "What I ought to do?" and "What kind of person should I be"?
    12·1 answer
  • explain why you can determine machine epsilon on a computer using IEEE double precision and the IEEE Rounding to Nearest Rule by
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!