1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrezito [222]
3 years ago
13

What is sexual intercourse ​

Computers and Technology
2 answers:
n200080 [17]3 years ago
7 0

Answer:

immmm ....

I know the answer but I won't tell..lolllll

kati45 [8]3 years ago
6 0

Answer:

it's sex

Explanation:

which is inserting a penis in a vagina

You might be interested in
Can somebody please help me with these few questions?
Sophie [7]

Answer:

Felicia is using an ethernet cord which is making the wifi go extreme slow plus she still has the wifi on , on the computer while ethernet is in

Explanation:

Felicia is using an ethernet cord which is making the wifi go extreme slow plus she still has the wifi on , on the computer while ethernet is in

4 0
2 years ago
When network traffic is encrypted, it is invisible and its content and purpose are masked.
Olenka [21]

Answer:

true

Explanation:

encryption is when you scramble the contents of information

4 0
2 years ago
____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user,
Irina-Kira [14]
The correct answer is usually referred to as '<span>confidentiality'.</span>
4 0
3 years ago
What is the build in libary function to compare two strings?​
worty [1.4K]

Answer:

strcmp() is a built-in library function and is declared in <string. h> header file. This function takes two strings as arguments and compare these two strings lexicographically.

Explanation:

Hope it helps

3 0
3 years ago
You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the
Temka [501]

Answer:

The answer is (B) Maximum password age.

Explanation:

To prevent several changing of passwords by a user in a day, the maximum times a password can be rest within a day is normally set by  the system administrator.

The setting ensures the password is returned to the current settings of the password on the system for the user and prevents unnecessary changing of passwords in a day by user.

6 0
4 years ago
Read 2 more answers
Other questions:
  • The purpose of the ________ element is to describe the contents of a table.
    15·1 answer
  • A ___ is the basic collective unit of data in a computer.
    12·1 answer
  • What are the main types of computer software?
    5·2 answers
  • The type of database that uses fields, records, and measure as data attributes is
    7·1 answer
  • This program has some errors in it that are needed to be checked import java.io.*;
    13·1 answer
  • Help what is a computer made from (computer class question)!!
    9·1 answer
  • Explain word processing ​
    11·2 answers
  • Which of these is the largest?<br> terabyte<br> exabyte<br> gigabyte<br> kilobyte<br> PLEASE HELP
    5·1 answer
  • Que es tarjeta madre resumen porfa
    13·2 answers
  • Help me with this two questions please
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!