1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlekseyPX
2 years ago
11

What online game do you play on the internet and can I play with you on it? I play downtown mafia 1960

Computers and Technology
1 answer:
SashulF [63]2 years ago
6 0

Answer:

None

Explanation:

I find them scary and they give me nightmares

You might be interested in
The most effective technique of malware propagation among the following list
iVinArrow [24]

Question Completion with Options:

A. Embedding & packing malcode in application programs

B. Replacing the Import-Address-Table (IAT)

C. Appending & prepending malcode into application programs

D. Embedding malcode in documents, such as MS O Office & PDF

Ε. Replicating malcode's source code

Answer:

The most effective technique of malware propagation among the following list is:

A. Embedding & packing malcode in application program

Explanation:

Malware propagation becomes effective and replicates effortlessly when malicious codes (otherwise called malcodes, which are self-replicating malicious programs) are embedded and packed in application programs.  These usually take many years before they start to manifest, making them very difficult to detect.  They are often triggered by some set events.  Given the nature of malcodes and the culprits behind them, they are very dangerous to applications and pose substantial business risks.

6 0
3 years ago
. What is the relationship between frequency, wavelength and speed of a wave?
jeka94

Answer:

vw = fλ

Explanation:

Sound, like all waves, travels at a certain speed and has the properties of frequency and wavelength. You can observe direct evidence of the speed of sound while watching a fireworks display. The flash of an explosion is seen well before its sound is heard, implying both that sound travels at a finite speed and that it is much slower than light. You can also directly sense the frequency of a sound. Perception of frequency is called pitch. The wavelength of sound is not directly sensed, but indirect evidence is found in the correlation of the size of musical instruments with their pitch. Small instruments, such as a piccolo, typically make high-pitch sounds, while large instruments, such as a tuba, typically make low-pitch sounds. High pitch means small wavelength, and the size of a musical instrument is directly related to the wavelengths of sound it produces. So a small instrument creates short-wavelength sounds. Similar arguments hold that a large instrument creates long-wavelength sounds.

The relationship of the speed of sound, its frequency, and wavelength is the same as for all waves: vw = fλ, where vw is the speed of sound, f is its frequency, and λ is its wavelength. The wavelength of a sound is the distance between adjacent identical parts of a wave—for example, between adjacent compressions as illustrated in Figure 2. The frequency is the same as that of the source and is the number of waves that pass a point per unit time.

5 0
3 years ago
Michale spent 80 minutes at the libary he finished studying at 4:00 what time did michale start studying
Papessa [141]

Answer:

He finished at 2:40 P.M.

Explanation:

This is because 80 minutes= 1 hour and 20 minutes. Add 1 hour and 20 minutes to 2:40, which equals 4:00.

7 0
3 years ago
One random part of Chess is whether the white side or the black side moves first? A. True B. False
ohaa [14]
The correct answer is B. false.
Determining which color goes first is not random at all - it is a rule in chess that the White player will always start the game first, and will then be followed by the Black player. 
5 0
3 years ago
Read 2 more answers
What can be defined as in information technology environment?
natka813 [3]
Here is your answer

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which option can Jesse use to customize her company’s logo, name, address, and similar details in all her business documents?
    7·1 answer
  • If you delete an imessage does the other person see it
    12·1 answer
  • The main devices in a rectifier are:
    14·2 answers
  • You have been asked to create a Community leveraging Out-of-the-box login, logout, self-registration, and error pages. Would you
    5·1 answer
  • Whitch action should a user take to ensure that formatting is applied to a row? A. use the ctrl+a keys. B. highlight the whole t
    11·1 answer
  • Which function will add a name to a list of baseball players in Python?
    13·2 answers
  • Which of these would NOT be a valid Internet Control Message Protocol (ICMP) error message:
    6·1 answer
  • Cuzzzzzzzzzzzzzzzz iiiiiiiiiiiiiiiii remember everytimeeeeeeeeee on these days that i feel like you and meeeeeeeeeeeeeee
    15·1 answer
  • Which is a concept of the CIA of Computer Security
    7·1 answer
  • If there is a secure socket layer in place, what will you need in addition to a user id in order to access the shared files?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!