1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lapatulllka [165]
3 years ago
11

Kinda strange, and im good

Computers and Technology
2 answers:
zalisa [80]3 years ago
6 0

English - Hey, so I'm starting a little business. I'm going to be customizing shoes. If you want a pair of shoes please tell me. I will be putting another post with photos of shoes I've customized.

Spanish - Oye, estoy comenzando un pequeño negocio. Voy a personalizar zapatos. Si quieres un par de zapatos, dímelo. Estaré poniendo otra publicación con fotos de zapatos que he personalizado.

Insta account and website in progess

zhuklara [117]3 years ago
6 0

Answer:

Explanation:

GIRLLLLLYYYYYYY

You might be interested in
Which of the following is the system of rules and structure governing
Whitepunk [10]

The system of rules and structure which governs language is generally referred to as: C. grammar.

<h3>What is language?</h3>

A language simply refers to a structured system of communication through which living organisms, especially humans share information among themselves, especially through the use of spoken words and sounds.

In English language, grammar is the system of rules and structure which governs the use and composition of language.

Read more on language here: brainly.com/question/781903

#SPJ1

8 0
2 years ago
An insurance company utilizes SAP HANA for its day-to-day ERP operations. Since they can’t migrate this database due to customer
hichkok12 [17]

Answer: An Internet-routable IP address (static) of the customer gateway's external interface for the on-premises network

Explanation:

Based on the information given, an Internet-routable IP address (static) of the customer gateway's external interface for the on-premises network need to be configured outside of the VPC for them to have a successful site-to-site VPN connection.

The Internet-routable IP address will be used in the identificatiob of each computer through the use of the Internet Protocol for the communication over a network.

3 0
3 years ago
What is used in computer appliances and special-purpose applications, such as an automobile, ATM, or media player and is used fo
zlopas [31]

Answer:

Embedded Operating System.

Explanation:

Embedded OS (also called Real Time Operating System) is designed to perform a single purpose in devices that may or may not be computers that have very little computer power and little RAM size such as washing machines, ATM, media player, automobiles, and cameras.  Examples of such embedded operating system are iOS(used in Apple's mobile devices), Symbian, Palm OS and Window OS.

Since they are used in single-purpose computers, they handle and perform their tasks with so much efficiency.

<em>Hope this helps!</em>

6 0
3 years ago
Data are made anonymous by Destroying all identifiers connected to the data. Requiring all members of the research team to sign
mestny [16]

Answer:

Destroying all identifiers connected to the data.

Explanation:

Identifiers are your virtual location when navigating, if you destroy your 'Virtual ID', nobody could identify you. Also, you could hide your identifiers, in this case, there's a small risk.

3 0
3 years ago
List three considerations when you choose memory.
liq [111]
1)How many memory cards (how many can you computer hold)
2)Company (some companies run better than others)
3)Amount of memory (xGb)
8 0
3 years ago
Other questions:
  • The act of engaging in crime through the use of a computer or similar type of device is called:
    8·1 answer
  • Maria found a cupcake recipe on a cooking blog. However, she would like to read comments and suggestions before she begins bakin
    6·2 answers
  • Which best describes the benefits of renting a home?
    10·2 answers
  • The area on your screen where you can access the tab and menu options for word is called what?
    8·2 answers
  • What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130
    10·1 answer
  • Alice and Bob decide to communicate using NTRUEncrypt with parameters (N, p, q) = (7, 3, 29). Alice’s public key is h(x) = 3 + 1
    15·1 answer
  • Write a statement to add the key Tesla with value USA to car_makers. Modify the car maker of Fiat to Italy. Sample output for th
    13·1 answer
  • Which of the following is a characteristic of vector graphics?
    15·2 answers
  • Select one Layer 2 or wireless WAN technology presented in Lesson 3. Elaborate on its characteristics, pros and cons, and common
    13·1 answer
  • What type of malicious software technology is used to download and install software without the user's interaction?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!