1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nignag [31]
3 years ago
8

Tạo biến

Computers and Technology
1 answer:
rewona [7]3 years ago
5 0

Answer:

WHERE ARE YOU FROM

Explanation:

TRANSLATE IT TO ENGLISH

You might be interested in
What is done when Python complies your program
alexgriva [62]

Answer:

It makes

Explanation:

it run the program

4 0
3 years ago
Read 2 more answers
Ranges of IP address that anyone can use for their internal networks are known as ______.
Rama09 [41]
Since no answer choices, have to deduce it is Private Networks
8 0
3 years ago
Read 2 more answers
Need the answer ASAP !!!!
Nuetrik [128]

Answer:

periodic checks

Explanation:

6 0
2 years ago
If someone has the IP address 127.0.0.1 and tries to connect to the address 127.255.252.255, which are they attempting to connec
sertanlavr [38]
B is the answer i think
6 0
3 years ago
When both inputs of a J-K edge-triggered FF are high and the clock cycles, the output will ________.
shutvik [7]

Answer:

Explanation:

Toggle

5 0
3 years ago
Other questions:
  • reate a class called Plane, to implement the functionality of the Airline Reservation System. Write an application that uses the
    5·1 answer
  • Suppose we eliminate tcp and instead rely exclusively on udp as our only transport layer protocol. ⢠how does this impact opera
    15·1 answer
  • When were anonymous inner classes added to java?
    10·1 answer
  • How can you troubleshoot Internet access problems?
    11·1 answer
  • ____________ are collected from several entities at the same point in time.
    13·1 answer
  • Please tell fast plzzzzzzzz​
    11·2 answers
  • Exercise 3.6.9: 24 vs. "24"5 points
    7·1 answer
  • Make this be a 7th grade argument over a boy
    5·2 answers
  • List three ways of breaking a copyright law with the illegal copy of software.​
    11·1 answer
  • Which of the following Access objects provides a user-friendly data entry method?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!