1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nookie1986 [14]
2 years ago
11

Who tryna trade in gta my psn is xMadOrNawx-_-

Computers and Technology
2 answers:
barxatty [35]2 years ago
5 0
Ok I’ll add you to day
Roman55 [17]2 years ago
4 0
Ok so so so so so so so
You might be interested in
Which is the best description of a hierarchical report?
mixas84 [53]

Answer:

d

Explanation:

a report with records sorted in ascending order is the right answer

6 0
3 years ago
Is there apps/ websites like brainly?
Virty [35]

Answer:

Mathpix Snip, Socratic, Microsoft Math Solver....etc.

Explanation:

Hope this helps! :)

6 0
3 years ago
Read 2 more answers
How does collaborating on a project improve its quality?
Serga [27]
Several different collaborations on a project introduce variety, perspective and give the people working together communication skills for business in the future.
7 0
3 years ago
What is the information age?
Sergio [31]
The Information Age<span> (also known as the Computer </span>Age<span>, Digital </span>Age, or New Media Age<span>) is a period in human history characterized by the shift from traditional industry that the Industrial Revolution brought through industrialization, to an economy based on </span>information<span> computerization.</span>
4 0
3 years ago
Why is binary code made up of a series of ones and zeros?
Nadusha1986 [10]

A binary code represents text, computer processor instructions, or any other data using a two-symbol system. The two-symbol system used is often the binary number system's 0 and 1. The binary code assigns a pattern of binary digits, also known as bits, to each character, instruction, etc.

8 0
3 years ago
Other questions:
  • The pseudoinstructions that are available in an assembly language programming environment usually found in the Select one: a. CP
    6·1 answer
  • Which directory in the FHS stores programs and configuration information that can only be executed and modified by the root user
    10·1 answer
  • 6. Which of the following is malware? (1 point)
    10·2 answers
  • What is required for real-time surveillance of a suspects computer activity?/p Group of answer choices a. Blocking data transmis
    12·1 answer
  • What do newly PivotTables look like?
    9·1 answer
  • Give two advantages of representing integers in pure binary.
    5·1 answer
  • Most hard drives are divided into sectors of 512 bytes each. Our disk has a size of 16 GB. Fill in the blank to calculate how ma
    9·1 answer
  • A business that helps people find jobs for a fee
    12·1 answer
  • A collection of wiress connecting the CPU with main memory that is used to identify particular location is called
    13·1 answer
  • Which of the following statements describes the general idea of an assistive media​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!