1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crazy boy [7]
2 years ago
9

Yo it’s kind a sus. ££££££££££££££££££££££££££££££££££££ ¥

English
2 answers:
Degger [83]2 years ago
6 0

Suspicious? SUSpicious.. Sus..give me brainliest please

Finger [1]2 years ago
4 0

\huge{\colorbox{pink}{What Is?}}

\blue{\rule{99pt}{1000pt}}

You might be interested in
What is an antonym for expert? a novice b specialist c genius d adept
Pachacha [2.7K]

Answer:

a novice

Explanation:

8 0
4 years ago
Read 2 more answers
D) Savor
son4ous [18]
Persue is supposed to be pursue
5 0
2 years ago
Fears are bad for us. People shouldn't have them. Fears can psych you out and keep you from doing something worthwhile. Even som
alina1380 [7]

Answer:

Amazing statement although it is not a question

Explanation:

6 0
3 years ago
Read 2 more answers
read this excerpt from "gravity" by judith ortiz cofer: actually, though I would never have admitted it then, I loved the dancin
Semmy [17]

Answer:

gigiiguufufigjgjvocjclifxlututz

6 0
3 years ago
Which details support the central idea that information on the Internet is not protected well enough? Check all that apply. “onl
lutik1710 [3]

The correct answers are "Only a small fraction is securely encrypted; the remainder is poorly encrypted" and "Anybody can get their hands on more information".


It is true that not all of the internet traffic is protected. About 60% of this traffic is encrypted; the rest remains a work in progress. This puts uncovered information at the risk of getting collected by able computer security technicians.

With the increasing availability of tools to simulate firewall security breaches, free to download from the internet, anybody who takes the time to learn these practices is capable of compromising unencrypted information - or even encrypted, depending on their skill.


The other options are not to be considered supportive of the central idea since:


  • The quantity of internet users is irrelevant to the fact that whether the current amount of information is at risk or not. The precautions these users take when browsing the web however, are a more contributing fact to the idea.
  • Most people do not take adequate precautions when it comes to their privacy, evidence being that the amount of personal data submitted to social networks allows their administrators to take advantage of it, selling the information to advertisers and ensuring a multi-millionaire income.
6 0
3 years ago
Read 2 more answers
Other questions:
  • In the video “Feeling on Display” that your class watched, Claudia says, “There’s absolutely a double standard ... for girls, es
    9·1 answer
  • The tin can that was once a car is an example of which type of figurative language
    6·1 answer
  • Label the rhyme scheme of this poem.
    7·1 answer
  • 9. You must pass the SAT Reading test in order to graduate?<br> a. True<br> b. False
    14·1 answer
  • After the trumpet was sounded and the flag folded, a member of the honor guard knelt in front of my frail, aging mother, looked
    5·2 answers
  • Why immigrants are misunderstood
    13·1 answer
  • Which sentence is the best example of an objective summary? A. The Constitution is not lengthy and every citizen ought to read i
    7·2 answers
  • This is just a question, I want to see what everyone else thinks.
    10·2 answers
  • Help me!!
    11·2 answers
  • Assessment timer and count
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!