1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gulaghasi [49]
2 years ago
12

Help. serious help. the acc im using right now cant be ridded of by myself from being unable to have a pass. i need to contact a

serious admin or mod. hopefully europa wont take my question again because it will be the only way i could contact admins
Computers and Technology
1 answer:
anzhelika [568]2 years ago
7 0

Answer:

Can't really help you... But you can try emailing support.

You might be interested in
Write a note on antispyware progrmaes?​
MAXImum [283]

Answer: See explanation

Explanation:

Spyware refers to the software that has

a malicious behavior which gathers information about an individual or organization and then sends the information gathered to another entity which is used in causing harms to the user such as the privacy violation of the user.

Antispyware programmes are also called the spyware removal tools and they're the software which are used in the detection of harmful spyware which are then removed from the system. Examples include Avira, Norton, Avast, McAfee etc.

5 0
3 years ago
If, in a recursive solution, function A calls function B which calls function C, this is called ________ recursion. indirect thr
suter [353]

If, in a recursive solution, function A calls function B which calls function C, this is called<u> Indirect</u> recursion.

A recursive algorithm is said to be recursive if such an algorithm calls itself with smaller input values and get current result for implementing basic operations on those simple inputs.

Indirect recursion occurs when a function A invokes another function B which in turn makes it the original function and calls another function C.

Learn more about recursion here:

brainly.com/question/3169485?referrer=searchResults

6 0
2 years ago
3. Megan and her brother Marco have a side business where they shop at flea markets, garage sales, and estate
Neko [114]

Answer:

a

Explanation:

Megan doesn't have a registered business. She can't claim insurance

4 0
3 years ago
What are pixels that are the exact same between multiple friends called
erastova [34]

Answer:

The answer is temporal redundancy

Explanation:

Computer Definition. Pixels in two video frames that have the same values in the same location. Exploiting temporal redundancy is one of the primary techniques in video compression (see interframe coding). Contrast with spatial redundancy.

7 0
3 years ago
Who is a creator in the context of online photo sharing?
solniwko [45]
Image sharing, or photo sharing, is the publishing or transfer of a user's digital photos online. Image sharing websites offer services such as uploading, hosting, managing and sharing of photos (publicly or privately).[1] This function is provided through both websites and applications that facilitate the upload and display of images. The term can also be loosely applied to the use of online photo galleries that are set up and managed by individual users, including photoblogs. Sharing means that other users can view but not necessarily download images, and users can select different copyright options for their images.

While photoblogs tend only to display a chronological view of user-selected medium-sized photos, most photo sharing sites provide multiple views (such as thumbnailsand slideshows), the ability to classify photos into albums, and add annotations (such as captions or tags).

Desktop photo management applications may include their own photo-sharing features or integration with sites for uploading images to them. There are also desktop applications whose sole function is sharing images, generally using peer-to-peer networking. Basic image sharing functionality can be found in applications that allow you to email photos, for example by dragging and dropping them into pre-designed templates.

Photo sharing is not confined to the web and personal computers, but is also possible from portable devices such as camera phones, either directly or via MMS. Some cameras now come equipped with wireless networkingand similar sharing functionality themselves

photo-sharing website that helps people create an account this is answer


4 0
4 years ago
Read 2 more answers
Other questions:
  • Which vpn protocol is a poor choice for high-performance networks with many hosts due to vulnerabilities in ms-chap?
    15·1 answer
  • What are the three business writing formats
    12·1 answer
  • How do you bookmark a website in each of the internet browsers?
    9·1 answer
  • When applying a filter to a text layer, how can you ensure that the types editability is not lost
    12·1 answer
  • Files and folders in UNIX can be removed using the
    8·1 answer
  • Match the different stages of boot sequence with the order in which they occur.​
    15·2 answers
  • List four things that must be taken into consideration when evaluating different resources of information (and explain ANY ONE f
    8·1 answer
  • Read the scenario and then choose which type of
    12·2 answers
  • Question 2 (6 points)
    11·1 answer
  • What are some benefits that each computer system being used?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!