1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlekseyPX
2 years ago
11

What online game do you play on the internet and can I play with you on it? I play downtown mafia 1960

Computers and Technology
1 answer:
SashulF [63]2 years ago
6 0

Answer:

None

Explanation:

I find them scary and they give me nightmares

You might be interested in
With _____ technology, a web server delivers information to users, who have signed up for the service, instead of waiting for th
myrzilka [38]

With the use of Push technology, a web server delivers information to users, who have signed up for the service.

<h3>What is  push technology?</h3>

This is known to be Software that automatically send information to users. via a Web browser, e-mail, or others.

Note that in the case above, With the use of Push technology, a web server delivers information to users, who have signed up for the service.

Learn more about Push technology from

brainly.com/question/9165574

#SPJ12

6 0
1 year ago
6. At age 17, what was Minhaj's definition of the American Dream?
marta [7]
“To me being American means having the opportunity to reach for our goals. It’s accepting where we come from while embracing our dreams and where we’re headed. It’s what makes America great.”
3 0
3 years ago
The key schedule results in generating multiple keys from the one secret key. These multiple keys are used:
Helga [31]

Answer:

Option(d) is the correct answer to the given question .

Explanation:

There are various type of algorithm is used for the purpose of the key scheduling such as AES .in the AES algorithm we used same key for encryption and decryption of text .The  main objective of the AES algorithm it is used by Various round of the similar plain text encryption to reinforce the cipher text.

  • The Option (a) is wrong because In the key scheduling the creating keys are not being used one after just another in the various communication cycles.
  • The Option (b) is wrong because In the key scheduling  we do not used the  the random key for the encryption process .
  • The Option (c) is wrong because we will never arbitrarily subdivided into groups of public and private key.

3 0
2 years ago
Heelo how do u do python syntax lesson 11 on code academy
pochemuha

have you tried www.khanacademy.org 


3 0
3 years ago
Which layer of the osi model defines functions related to data delivery, error recovery, and flow control?
Dominik [7]
Answer is the Transport Layer.
5 0
2 years ago
Other questions:
  • Write down the pseudo code of a program that calculates the Body Mass Index (BMI) of
    9·1 answer
  • What xDSL version provides a maximum throughput of 24 Mbps downstream and 3.3 Mbps upstream?
    9·1 answer
  • How can an Excel table be added to a Word document? Check all that apply.
    15·1 answer
  • 50 POINTS &amp; A FOLLOW!
    11·2 answers
  • The goal of this problem is to cover all roads with cameras. A camera placed at a station can cover all the roads connected to i
    9·1 answer
  • What is the first phone ever made?
    6·1 answer
  • What is the output of this program? age=4 if age &gt;5: print (“more”) else: print (“less”)
    7·1 answer
  • 1.<br>is the office industry leader at the moment.​
    9·1 answer
  • 1.a computer can create an output based on the input of the user.
    13·1 answer
  • to provide for ecmascript compatibility in older browsers, you can use group of answer choices javascript shivs javascript shims
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!