1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeX [460]
3 years ago
10

Everyone say bye to brainly cause I’m reporting it for being against the law

Computers and Technology
2 answers:
PilotLPTM [1.2K]3 years ago
4 0

Answer:   really

Explanation:

Opp

gayaneshka [121]3 years ago
3 0

Answer:

you too broke the law

say it's forbidden to ask nonsense eh

btw stay safe and god bless

You might be interested in
I can’t get answers because the ads won’t load help me
Flura [38]

Answer: Get better wifi

Explanation: This maybe a router problem, Go to your router and reset it by unplugging the power chord, After 30 seconds plug it back in and wait for your wifi to start back up. Your ads should load now. Have a good day.

7 0
3 years ago
Which of the following is a locate tool that will enable you to navigate to cell M291?
scoundrel [369]

just answered it its<u><em> Go To</em></u>

3 0
4 years ago
11. SQL Output III
borishaifa [10]

Answer:

wertweabcd

Explanation:

The LPAD() function left-pads a string with another string, to a certain length.

LPAD(string, length, lpad_string)

Parameter Description

string: Required. The original string. If the length of the original string is larger than the length parameter, this function removes the overfloating characters from string

length: Required. The length of the string after it has been left-padded

lpad_string: Required. The string to left-pad to string.

In example;

SELECT LPAD("SQL Brainly", 20, "ABC");

Output : ABCABCABSQL Brainly

4 0
3 years ago
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
Hotels and motels that are part of a ________ share a centralized reservation system and a common image, logo or advertising slo
hoa [83]
It is company , I think .
8 0
3 years ago
Other questions:
  • Universal Containers (UC) is currently live with Sales Cloud and in the process of implementing Service Cloud. UC wants to creat
    5·1 answer
  • Read the paragraph.
    12·2 answers
  • Which of the following is not one of the five major areas to include in your notes organizer?
    15·2 answers
  • Consider a router that interconnects three subnets: subnet 1, subnet 2, and subnet 3. suppose all of the interfaces in each of t
    11·2 answers
  • Which term describes a process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn, a
    6·1 answer
  • A manufacturer of machine tools creates a spreadsheet of tools and their cost. The spreadsheet has four fields: name of the tool
    10·2 answers
  • Usually written in block style with body text aligned along the left margin
    5·2 answers
  • Write a program to change background colour of your visual basic form with any 3 different events.​
    15·2 answers
  • Which of the following screen elements is a horizontal bar that displays at the
    8·1 answer
  • Please help me to creat flow chart tq​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!