1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolbaska11 [484]
2 years ago
10

Cute nya diba I like bts army​

Computers and Technology
1 answer:
lutik1710 [3]2 years ago
5 0

Answer:

ya up to you

Explanation:

bcoz i don't like bts ^√^

You might be interested in
Why are video games addictive????<br> please write at least 3 reasons
timurjin [86]
It’s many people’s hobby
It gives a sense of adrenaline
You will try on and on to win or finish the mission
5 0
4 years ago
Billy needs to type a bibliography/reference page for the report that he just typed. Which paragraph format should he use?
Olin [163]
He should use a MLA format

3 0
3 years ago
Every UNIX and Linux system contains full documentation of UNIX commands in the _____ pages.
Rashid [163]
Full documentation in the man pages.
8 0
4 years ago
Computer privacy typically occurs when which of the following is violated?
Helen [10]
B. open source software...
3 0
3 years ago
5. You were discussing software piracy with a friend and were surprised to learn how software piracy can impact your life every
hammer [34]
In class we learned not to keep but so much information on software. Your information can be hacked at any given moment. Hackers can use your information to their personal used. Do not open or respond to spam emails or pop ups saying you won anything its a scam and they can send a virus to your computer only thing they need is for you to open the email. If you have a virus backup your data then reset your whole computer the virus would be gone. Software privacy can effect your life very much just watch what you put on your computer.
5 0
3 years ago
Other questions:
  • Should i buy the Samsung s10+ or wait for s11 or any other phones you guys suggest?
    6·2 answers
  • ____________________ software is a type of security software designed to identify and neutralize web bugs, ad-serving cookies, a
    8·1 answer
  • Desirable workplace habits and skills include:
    6·2 answers
  • Which of the following sections of a business plan comes first but should be written last?
    11·2 answers
  • Programmers refer to programs that contain meaningful names as ____. AnswerThe answer is: Programmers refer to programs that con
    12·1 answer
  • Which protocol is used to send web pages from a web server to a web browser?
    13·1 answer
  • The term used to describe the shape and layout of a computer component such as a motherboard or hard drive is ______ factor.
    5·1 answer
  • BST
    13·1 answer
  • What is this on G00gel Documents , how do I fix it?
    15·1 answer
  • A computer lacks a division instruction and performs iteratively using the technique described on page 300. suppose we wish to e
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!