1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-s [515]
2 years ago
11

I DISLIKE HOW PEOPLE PUT IN LINKS THEN DELETE THEIR ANSWER!!!!

Computers and Technology
1 answer:
alisha [4.7K]2 years ago
7 0

Answer:

Explanation:

Uh yh I d like it either

You might be interested in
The algorithm ____ is used to find the elements in one range of elements that do not appear in another range of elements.
Musya8 [376]

Answer:

A. set_union

Explanation:

The algorithm set_union is used to find the elements in one range of elements that do not appear in another range of elements.

4 0
3 years ago
A small _____ at the lower right corner of a tool indicates that it contains hidden tools​
Vinil7 [7]

Answer:

A small <u><em>TRIANGLE</em></u> at the lower right corner of a tool indicates that it contains hidden tools​

Explanation:

hope it helps you :)

6 0
2 years ago
Need help with python coding
Ivanshal [37]

Answer:

def= definition

Explanation:

7 0
3 years ago
Read 2 more answers
You can initialize more than one variable in a for loop by placing a(n) ____ between the separate statements.
Wittaler [7]
Comma





-------------------------------------------------
5 0
3 years ago
In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target fr
Travka [436]

Answer:

denial of service

Explanation:

3 0
3 years ago
Other questions:
  • Which magazine loved their alienware test pc so much they didn't want to send it back?
    11·1 answer
  • A professional bureaucracy is a knowledge-based organization where goods and services depend on the expertise and knowledge of p
    7·1 answer
  • 14. Which of the following statements is true? A. The most secure email message authenticity and confidentiality isprovided by s
    11·1 answer
  • Write a C function which takes three parameters which are the cost for an item in a grocery store, the quantity to buy, and the
    12·2 answers
  • Can we update App Store in any apple device. (because my device is kinda old and if want to download the recent apps it aint sho
    10·1 answer
  • Please help it’s timed
    11·1 answer
  • Prepare the truth table for the following boolean expressions: (A+B).(A+C).(B)
    12·1 answer
  • Which of the following can be used to help find the error
    8·1 answer
  • What refers to a set of instructions executed in order?
    6·1 answer
  • 14. How do digital libraries address the problem of digital exclusion?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!