1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GarryVolchara [31]
2 years ago
11

How do you mark someone brainliest?

Computers and Technology
2 answers:
Stolb23 [73]2 years ago
6 0

Answer:

it will be on the bottom right of a answer :)

Explanation:

stich3 [128]2 years ago
5 0

Answer: You should see a crown then press it to mark brainliest It right by the massage button and the report button on the right of the massage button

Explanation:

You might be interested in
A = 250; B = 325. which of the following statements is true? A ==B A>B A =B
Ivanshal [37]

Answer:

lollol

Explanation:

7 0
3 years ago
What are output statement in QBASIC?
Roman55 [17]

Answer:

<h2> hi. here's your answer ....</h2>

<h3>print statement provides output on the screen . it prints the value of the expression on the screen . if the expression list is blank , no character is print . the expression in the list may be numeric or string .</h3><h2>Hope you like it..</h2><h2>(◕ᴗ◕✿)</h2>

5 0
3 years ago
Which OS does NOT provide users with a GUI?
vesna_86 [32]
The answer is C ms-dos
Side note:
GUI means graphical user interface. In other words, that means it looks pretty and has cool buttons, animations and cute stuff. MS-DOS is just a black screen with words on it. Definitely not cute or cool.
3 0
4 years ago
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most preci
Slav-nsk [51]
The containment strategy prevents intruders from removing information assets from the network, and prevents attackers from using the organization's network as a launch point for subsequent attacks.
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most precise strategy possible, starting with <span>blocking a specific IP address. Correct answer: C

</span>

8 0
3 years ago
Is a hotdog a sandwich?​
Stells [14]

Answer:

Explanation:

Yes

4 0
4 years ago
Read 2 more answers
Other questions:
  • You want to install an rodc in your windows server 2003 forest, which currently has all windows server 2003 domain controllers.
    11·1 answer
  • What feature would be used to collect how many times users downloaded a product catalog?
    11·1 answer
  • Syah work as senior designer in creative design company. he is an imaginative person and always updates himself with the latest
    15·1 answer
  • An array of Strings, names, has been declared and initialized. Write the statements needed to determine whether any of the array
    9·1 answer
  • The process of converting an input file (stream of characters) into an understandable format is called syntax analysis.
    7·1 answer
  • What tag is used to contain information about a web page, such as the title and related pages?
    12·1 answer
  • Lists and Procedures Pseudocode Practice For each situation, provide a pseudocoded algorithm that would accomplish the task. Mak
    8·1 answer
  • "if" statements are part of creating computer programs, what are these instructions called and how would you use them?
    11·2 answers
  • Who Invented Abacus!
    15·1 answer
  • When a file is used by a program, there are three steps that must be taken:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!