Quick!
who can solve this?

:}
:}
:}
:}
:}​

Quick!who Can Solve This?:}:}:}:}:}

Answers

Answer 1

Answer:

1.server

2.container

3.empty

4.lead

5.body

6.conttribute

i just know this much

sry


Related Questions

Explain the terms Tags and Attributes.

Answers

Answer:

a tag is a way of representing an HTML element in the program, while an attribute is a way of describing the characteristics of an HTML element.

Explanation:

Answer:

A tag is a way of representing an HTML element in the program, while an attribute is a way of describing the characteristics of an HTML element.

In order to communicate over the Internet computers send small bits of data called ______ to eachother.

Answers

Answer:

communication

Explanation:

............

Select the correct answer. If a = 4, what is the value of the expression 12 - a/4 ? A. 1/2 B. 4 C. 11 D. 12

Answers

Answer:

C)

Explanation:

Because if 4 = A, then we're doing 12 - 4/4.
4/4 is equal to 1/1, which is equal to 1 as a whole number, and 12 - 1 is 11.

__________ is a Microsoft software development tool that developers can use to write multimedia applications

Answers

answer:

DirectX.    

hopefully this is helpful.

how is an inventory of activities different from an inventory of objects?

Answers

The inventory of activities different from an inventory of objects because inventory of activities involves a record of business routine activities , while inventory of objects allows identification and recovery of an object.

What is inventory of activities and an inventory of objects

The inventory of activities entail the record of business routine activities, this could be last purchase of supplies.

The inventory of objects  on the other hand is about identification and recovery of an object and with this Inventories are detailed.

Learn more about inventory at;

https://brainly.com/question/25818989

Reggie is having trouble signing into his email account at work. He picks up the phone to call someone in IT, and then checks the phone list to see who to call. Which IT area should Reggie call

Answers

The IT area that Reggie should call is called; Information Security

What are the functions of an Information Technology Department?

The IT department that Reggie should call is called Information Security department.

This is because Information security protects sensitive information from unauthorized activities such as inspection, modification, recording, and any disruption or destruction.

The aim of this department is to make sure that the safety and privacy of critical data such as customer account details, financial data or intellectual property are safe.

Read more about information technology at; https://brainly.com/question/25920220

What is by far the most popular dns server software available?.

Answers

Answer:

I use the server

8.8.8.8

and

8.8.4.4

Explanation:

BIND (Berkeley Internet Name Domain) is by far the most popular DNS server software available.

What is the BIND?

BIND(Berkeley Internet Name Domain) is open-source software that executes the Domain Name System (DNS) protocols for the internet. It is widely used on Unix-like operating systems, including Linux and macOS, as well as on Microsoft Windows.

BIND is developed and sustained by the Internet Systems Consortium (ISC), a nonprofit organization that encourages the development of the internet.

It is the most widely deployed DNS software in the world and is used by many internet service providers, businesses, and organizations to manage their DNS infrastructure.

Thus, BIND (Berkeley Internet Name Domain) is by far the most widely used DNS server software.

To learn more about DNS server software click here:

https://brainly.com/question/13852466

#SPJ12

Suppose you have a multithreaded program with 3 threads. One thread spends most of its time in a busy waiting loop. The other two threads are tightly coupled so that they one thread is often waiting on the other. What kind of threads would provide the most efficient execution

Answers

The kind of thread that will give the most efficient execution in this scenario is the tapered thread.

What is a tapered thread?

It should be noted that a tapered thread simply means a thread that simply tapers along the thread profile.

In this case, since a thread spends most of its time in a busy waiting loop while the other two threads are tightly coupled, then the tapered thread is appropriate.

Learn more about threads on:

https://brainly.com/question/25004623

a linear search is performed to find the item emu. state the items which will be examined

Answers

Answer:

A linear search is the simplest method of searching data. set. Starting at the beginning of the data set, each item of data is examined until a match is made.

What is the relationship between a condition and an action?

A. The program creates its own conditions, and lets you choose which action to take.

B. The program performs an action, which changes all conditions.

C. The program checks to see if a condition is met, and if so, it performs an action.

D. The program checks to see if any actions are occurring, then randomly sets a condition.

Answers

The answer is C , The program checks to see if a condition is met and if so it performs an action!

__________ allows an issuer to access regional and national networks that connect point of sale devices and bank teller machines worldwide.

Answers

Answer:

EFT

Explanation:

out of

A. EFT

B. ATM

C. POS

D. ALF

EFT is the answer

Payment gateway allows an issuer to access regional and national networks that connect point of sale devices and bank teller machines worldwide.

What is. payment gateway?

A payment gateway is a technology or service that enables merchants or issuers to connect their point of sale (POS) devices and bank teller machines to regional and national networks.

It allows the processing of electronic transactions, such as credit card payments, by securely transmitting transaction data between the merchant, the issuing bank, and the acquiring bank.

Payment gateways provide the infrastructure for authorizing, capturing, and settling payment transactions, facilitating seamless and secure communication across various networks and financial institutions.

learn more about Payment gateway: https://brainly.com/question/31465886

#SPJ2

How to get the id of a document in firebase in react.

Answers

Answer:I don’t know

Explanation:yea I don’t know you can get caught

How do you flatten a 2D array to become a 1D array in Java?

Answers

Answer:

With Guava, you can use either

int[] all = Ints.concat(originalArray);

or

int[] all = Ints.concat(a, b, c);

Explanation:

Use GUAVA

Credit sales to customers are: ____________
a) Recorded using a Create Invoices window
b) Recorded in a Credit Card Sales window
c) Recorded using the Create Sales Receipts window
d) Recorded using the Enter Bills window

Answers

Answer:

C. Recorded using a Create Invoices window

Explanation:

Credit sales refers to the purchases made by customers for which payment is delayed. A reasonable payment delay allows customers to make additional purchases as delayed payments allow customers to generate cash with the purchased goods which in turn can be used to pay back the seller.

These are purchases made by a customer that do not require a full payment  at the time of purchase.

Credit sales to customers are recorded using a Create Invoices window.

can you edit header or footer? if yes, how​

Answers

Answer:

It depends on the type of document you are trying to edit, but normally you can edit the header/footer.

Explanation:

For docs, you just double click near the top/bottom of the page.

The _____, also known as the system chassis, is a container that houses most of the electronic components that make up a computer system.

Answers

Answer:

I am pretty sure it is the RSA

Explanation:

When you delete a file or folder in windows what happens to it.

Answers

Answer: When you delete a file, Windows removes the pointer and marks the sectors containing the file's data as available. From the file system's point of view, the file is no longer present on your hard drive and the sectors containing its data are considered free space.

Explanation:

The goal of the step of the etl process is to take the source data from all the various sources and convert it into a single format suitable for processing.

Answers

It should be noted that goal of the Transform step of the ETL process is to take the source data from all the various sources and convert it into a single format.

What is ETL?

ETL,  can be explained as data integration process which make use of data from multiple data sources into a single one.

It stands for;

extract transformload,

It turns all the various sources and convert it into a single format.

Learn more about ETL at;

https://brainly.com/question/24313597

The storage capacity of Go ogle drive can be increased from ____________.
a. 5GB to 15 GB
b. 15GB to 1TB
c. 100GB to 30TB.

Answers

Answer:

c. 100GB to 30TB

Explanation:

Please mark me as brainliest and hope this helps :)

Answer:

The answer is C.

Explanation:

The storage capacity of Go ogle drive can be increased from 100GB to 30TB.

What symbol should you look for to determine who owns the intellectual property of a website? the logo the web address the domain suffix the copyright symbol.

Answers

Answer:

the answer is d

Explanation:

took the test

Answer:

d

Explanation:

edge2023

Choose the best answer from the options below to complete the following sentence.

Storage is different from RAM because for storage, information is _________, even if power is turned off.

preserved

temporary

deleted

unsaved

Answers

Answer:

its A. the answer to your question is preserved. :)

Answer:

A

Explanation:

The FastEthernet 0/0 interface on a switch is currently disabled. You need to enable it so a workstation can be connected. Drag the command on the left to the appropriate configuration step on the right to accomplish this. Enter global configuration mode, Enter interface configuration mode, Enable the interface, Verify the interface is disabled.

Answers

The appropriate configuration step and command to connect a workstation to the switch are:

Enter global configuration mode: config t.Enter interface configuration mode: int fa0/0.Enable the interface: no shut.Verify the interface is disabled: show interface status

What is a command?

A command can be defined as a set of instructions that are typically used to configure a network device such as a switch, so as to enable it perform certain tasks automatically during network communication.

In Computer networking, commands can be used to ensure the interfaces (ports) on a switch are active and open for connections from other network devices such as:

WorkstationRouter

Read more on switch here: https://brainly.com/question/13243868

Which type of password attack employs a list of pre-defined passwords that it tries against a login prompt?.

Answers

That is calld a bruteforce attack

Biometric authentication can’t be reset. TRUE or FALSE

Answers

Answer:

True

Explanation:

Once it's breached, it's breached forever

lmk if this helps

How many bytes does it take to represent a color in the rgb color model?.

Answers

Answer: 3 bytes

Explanation: Hope this helps if not sorry.

Which of the following tabs on the Ribbon contains the commands for adding tables, pictures and shapes into a publication? Question 19 options: Insert Page Design Home Mailings.

Answers

Answer:

it is insert

Explanation:

The mouse, keyboard, and speakers are some of the things that would be plugged into _____ on the back of the system unit

Answers

Answer:

USB PORT are on the back on the system case

. When you ____________________ a word, you can use a single line, a double lines, a dotted line, or even a wavy line!

Answers

Answe
That is the answer just had that

What's a big question or problem in the tech field you'd like to solve and why?

Answers

A big question or problem in the tech field that i would like to solve is Data security.

What is Data security ?

Data security  can be regarded as process of protecting data from unauthorized user as well as protection from  data corruption .

I will like to solve this problem because as advances in technology, the data of individual or organization is not been total secured and this is posing so much loss to individuals.

Data security are;

data encryption hashing tokenization

Learn more about Data security at;

https://brainly.com/question/17493537

coding is..? i need help pls reply quick

Answers

Answer: Code is made up of a series of steps that instruct computers on how to perform a specific task.

Explanation: Computer software, games, apps, and websites can all be created using coding. A programmer is a person who is responsible for writing the programs that drive everything we do on a computer.

Other Questions
My sister was feeling under the weather, so she stayed home.What fugitive language is this help asap A serious form of personal cybercrime with the perpetrator demonstrating a pattern of harassment and posing a credible threat of harm is ________. a) cyber-stalking b) identity theft c) cyber-terrorism d) cyberbullying Which of these BEST explains why most of Canada's population has settled near its border with the United States?A: Canada is populated primarily by former American citizens.B: Canadians prefer the culture of the United States to that of their own.C: because most manufacturing and service industries are located in that areaD: There are few resources north of the United States to sustain large populations. Jessie bought 11 red roses and 7 white roses. The ratio of the number of white roses to the number of red roses is what? Convert the angle - 3 radians to degrees, rounding to the nearest 10th. why do people form group is forming a group accidental or spontaneous? Please helppp :)1) Simplify the expression. 2x(13x) + (2x + 3)(3x 2)Make sure you show all your work for full credit. Use standard polynomial format. Please help me with this I need to get it done What are the effects of monsoons on Bangladesh? Question 2 options: Prolonged drought Severe Flooding Deadly tsunamis Dangerous Tornadoes. so water is wet? is it is it is it is it is it Can the zodiac move through the constellation A circle has a radius of 14 feet. Round each answer to the nearest whole number. The exact area of the circle is square feet. Whats the correct answer for this question? 9. Reed will randomly select two marbles from thebag one at a time without replacement. What is theprobability that Reed will select a 3 first and then a 5 How many medians a triangle can have? I need help with this question ASAP Look over the image in the top section and choose which piece from the bottom should be placed in the question mark (?) that would be next in the sequence. Which action is not an accomplishment of the Apollo missions?to orbit the Earth for two weeksto study the surface of the moonto send rovers to the Moonto land on the moon Why is there so much nudity in the works of the Sistine Chapel?. Bipolar disorder has a _______________ rate of heritability, suggesting a biological etiology.