1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
choli [55]
4 years ago
6

Who goes to belle place middle and is in 7th grade on hear​

Computers and Technology
1 answer:
SashulF [63]4 years ago
3 0

Answer:

Not me but thx for the free points lol

Explanation:

You might be interested in
4.11 lesson practice edhesive
spin [16.1K]

Answer:

the last one

Explanation:

6 0
3 years ago
Read 2 more answers
Which layer of the osi model defines functions related to data delivery, error recovery, and flow control?
Dominik [7]
Answer is the Transport Layer.
5 0
3 years ago
(BRAINLIEST QUESTION!!!)
docker41 [41]

Answer:

Possible if hackers are not so intelligent.

Explanation:

Actually, hackers are intelligent

where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.

Normally hackers will generate different location places and by using decipher it is possible to find the location codes.

Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.

It is possible to by using decipher to get uncovered locations

4 0
3 years ago
Write a statement to declare a variable x with data type int and initialise with the value 10​
nexus9112 [7]

Answer:

int x = 10;

Explanation:

This would work in many languages (C/C++/C#/Java).

6 0
2 years ago
What does a proxy server do?<br> Help please!!
Svet_ta [14]

Answer:

A proxy server acts as a gateway between you and the internet. It's an intermediary server separating end users from the websites they browse. Proxy servers provide varying levels of functionality, security, and privacy depending on your use case, needs, or company policy.

5 0
3 years ago
Other questions:
  • Is anyone else experiencing the wording::nonifacation::glitch about the "5 hours ago" thingy to whenever you answer a question o
    7·2 answers
  • Select all statements that correctly describe the ramifications of important features supported by modern DBMS.
    15·1 answer
  • What is the best overall approach to education and career development for IT professionals?
    14·2 answers
  • 4. An advantage presented by straight-in spaces is that
    12·1 answer
  • What are some good electronics that I can buy on Amazon?
    14·1 answer
  • If you use the assign software to a user option, how does the new software install to the user's computer? 70-411
    10·1 answer
  • True or False: Changing a bid package's status to "Closed" removed it from the bidder's Planroom and the bidder will no longer b
    15·1 answer
  • What can you do to help create a safe online environment?
    8·2 answers
  • It is used to select specific menu options, drag and drop options and to draw something on screen.
    6·1 answer
  • Neymar machine that Run on electricity
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!