How many words is 3 pages double spaced times new roman 12?.

Answers

Answer 1
Have a good day tomorrow babe love love babe love baby babe love you baby baby babe babe

Related Questions

does anyone have experience with raptor

Answers

Answer:

yes, I have experienced with raptor

HI I DESPRATELY NEED HELP i know this isnt about school but i really need help to turn get rid of a boot camp assistent, everywhere i look up how to it usually says
Start up your Mac in macOS.

Quit all open apps and log out any other users.

Open Boot Camp Assistant , then click Continue.

If the Select Tasks step appears, select “Remove Windows 10 or later version,” then click Continue.

BUT WHENEVER I TRY TO OPEN IT IT JUST OPENS THE FILES PLS HELP IM DESPRATE

Answers

Answer:

U can't remove it because it is a flash drive, so remove your flash drive and it will go away. Moreover you can't just erase those files if is the life of the computer. Anyways it if talking about rename it just click on rename.

Which probe is designed exclusively to monitor the RF for transmissions and can only monitor the airwaves

Answers

The probe that  is designed exclusively to monitor the RF for transmissions and can only monitor the airwaves is dedicated probe.

What is dedicated probe?

A dedicated probe is known to be a kind of probe that has the ability  to be or functions as both a probe and also as an access point that can give roaming to wireless users.

Note that a dedicated probe is often used to track the RF frequency that is mainly used for transmission. These probes often act as both an AP and a probe so as to look into the airwaves.

Learn more about probe from

https://brainly.com/question/2092614

A ____________ is a collection of infected IT devices that an attacker or attack group controls.

Answers

The answer would be a Botnet .

When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch

Answers

The Trunk ports is the type of switch ports are members of all VLANs defined on the switch.

What are trunk ports?

A trunk port is known to be a type of of port that can be found on a network switch.

It is a port that helps or allows data to move across a network node for a lot of virtual local area networks or VLANs. You can say that it is  a “bundle” of personal branches in a telecom network connection.

What is a Trunk Port? - Definition from Techopediahttps://www.techopedia.com › .

Learn more about VLANs  from

https://brainly.com/question/25867685

What bandwidth is used in special leased lines to connect midrange computers and mainframes as well as to transmit data over long distances?.

Answers

The bandwidth that is used in special leased lines to connect midrange computers and mainframes as well as to transmit data over long distances is Medium band.

What is Medium band?

This is known to be a bandwidth that is often used in some particular leased lines to link up midrange computers and mainframes.

Conclusively, It is also used in  moving data over any long distances. This bandwidth is is known to be very capable of doing any high-speed data transfer.

Learn more about bandwidth from

https://brainly.com/question/4294318

What does it mean when your ip address is blacklisted.

Answers

Answer:

It means your IP Address cannot access certain websites, depending on the type of blacklist.

Write a python code that prompts the user for a floating-point number and prints
the smallest integer that is larger than the number the user entered.

Answers

Answer:

glitched

Explanation:

brainly deleted my answer

Which of the following is a feature of a utility program
a) It is unavailable to users
b) It is part of an integrated package
c) it is written by application users
d)it is considered to be systems software​

Answers

The option that is a feature of a utility program  is that it is considered to be systems software​.

What is a utility program?

Utility-programs are known to be any kind of  program that carry out a particular task that is linked to the management of computer functions, resources,  password protection, etc.

Some Features of Utility Software:

All the software can index folders and files in a matter of seconds. It often keep indexed records through database files, etc.

Utility software are known to bee system software set up to help analyze, configure, optimize etc. on a system.

Learn more about utility program from

https://brainly.com/question/20659068

Which word did alexander graham bell want adopted as a telephone greeting instead of hello.

Answers

Answer:

I believe it was Ahoy.

Explanation:

I could be wrong though.

Answer: Ahoy

Explanation: According to nrp.com "Alexander Graham Bell initially suggested that the standard greeting when answering a telephone should be 'ahoy', but instead 'hello' (suggested by Thomas Edison) was adopted."

what should you do if an online friend asked to meet you after school?
ᵖˡˢˢˢˢ...​

Answers

Answer:

I'm going to agree if they had some decision when we meet to each other because I want to meet them in personal.

Explanation:

That's my own opinion

A 32-bit number that's used to keep track of where you are in a sequence of TCP segments is known as a(n) ______ number.

Answers

A sequence number is a 32-bit number that's used to indicate where you are in a sequence of TCP segments.

What is TCP?

TCP is an acronym for Transmission Control Protocol and it is an essential and important standard protocol of the Internet protocol network.

In Computer technology, TCP is an essential part of the transmission control protocol and internet protocol (TCP/IP) network which has a wide range of applications in the following areas:

File transfersWorld wide web (WWW).Remote administrationE-mail

In TCP segments, a sequence number is a 32-bit number that's typically used to indicate where an end user is in a sequence.

Read more on TCP here: https://brainly.com/question/17387945

Tonya is concerned about the risk that an attacker will attempt to gain access to her organization's database server. She is searching for a control that would discourage the attacker from attempting to gain access. What type of security control is she seeking to implement

Answers

Answer:

The answer is Deterrent

Explanation:

Deterrent controls are administrative mechanisms (such as policies, procedures, standards, guidelines, laws, and regulations) that are used to govern an organization's security execution. Deterrent controls are used to ensure that external controls, such as regulatory compliance, are followed. I hope this helps! ^-^

What are at least three common technologies used within this pathway?.

Answers

Multitasking , in a variety of environments, long distance communications

If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature

Answers

The key would he use to create the digital signature is Mike public key.

Which key is used to sign messages?

Digital signatures are known to be used via public key. Here, the person is said to be one who is said to produce or creates the digital signature that  uses a private key to encrypt signature-linked data.

The only way to decrypt a data is only with the signer's public key, the key David would use to create the digital signature is Mike public key.

Learn more about  public key from

https://brainly.com/question/17486027

what is the answer i need help asap

Answers

Answer:

A

Explanation:

Transformers are used on power lines to take high voltage and powerful electricity and turn it into safe electricity.

Answer:

Transformer

Explanation:

It makes sense!  A transformer like, changes the power, so if they needed to reduce the power, they use a transformer!

When adding a component to a container with the ____ layout, specify the NORTH, EAST, SOUTH, WEST, or CENTER position.

Answers

Answer:

Border

Explanation:

When adding a component to a container with the BORDER layout, specify the NORTH, EAST, SOUTH, WEST, or CENTER position.

What does a virtual machine emulate?

Hardware
Networks
User interfaces
Web sites

Answers

Question

What does a virtual machine emulate?

✒ Answer

Hardware

What will the following code print?
My width = 4
height = 12
perimeter = width * 2 + height * 2
print (perimeter)

Answers

perimeter = width * 2 + height * 2

width = 4

height = 12

perimiter = (4*2)+(12*2)

perimiter =8+24

perimiter =32

Since it displays perimiter, it would display 32

How should I go about fixing this error in Java?

System.out.printIn("E");
^
symbol: method printIn(String)
location: variable out of type PrintStream
1 error

Answers

Answer:

use println with an L in stead of an I

Explanation:

In this font, the capital i can lowercase L look very similar. If you paste this in notepad, you can see you typed "print in", with an i.

It should be with an L as in print line.

Amanda wants to prevent sensitive data from being sent via email in her organization. What type of agent software can she install on her systems to identify properly categorized or tagged information before it leaves the company

Answers

The type of agent software can she install on her systems to identify properly categorized or tagged information before it leaves the company is a strong antivirus software.

What are some ways to handle against email phishing attacks?

People are known to have system and they are said to have different kinds of attacks from outside sources. The ways to protect yourself from Phishing are:

Be on guard towards the  handing of sensitive information. Never click on alarming messages. Do not open any form of attachments that is suspicious or strange.

Learn more about  phishing attacks from

https://brainly.com/question/2537406

Jake has a worksheet with many columns of data. He wants to see different parts of a list at the same time. Which action would be best for him to take

Answers

The action that would be best for Jake to use on the given worksheet is to; Split vertically

How to properly arrange excel columns?

In Microsoft excel, we know that there are usually rows and columns on the worksheet.

Now, these rows and columns could be edited to suit the information required to be entered into them. Now a list is usually in columns and not rows and as such for Jake to see the different parts of the list at the same time, he needs to split the list vertically.

In conclusion, the best action for Jake is to split vertically.

Read more about Microsoft Excel at; https://brainly.com/question/25863198

Which sentences describe the purpose of a magazine cover?
A magazine cover has to visually appeal customers. Depending on the type of magazine brand, the cover also represents social, political,
economic, medical, ltechnology, and fashion trends. A magazine cover has to appear different from other magazine covers in the newsstand or
store, and help to drive sales of the magazine brand. As a graphic designer designing a magazine cover, you need to know what will print well.

Answers

The  sentence that describe the purpose of a magazine cover is that a magazine cover has to visually appeal customers.

Based on the type of magazine brand, the cover also stands for social, political, economic, medical, technology, and fashion trends.

What is the aim of a magazine cover?

A key functions of the magazine cover is made so that it can sell the issue's inside features(stories).

The  magazine cover  is one that is very vital as it has a lot of short quotes or intriguing lines  that is said to be floating about the cover page.

Learn more about  magazine cover from

https://brainly.com/question/25817628

Answer:

A magazine cover has to visually appeal customers. Depending on the type of magazine brand, the cover also represents social, political, economic, medical, technology, and fashion trends. A magazine cover has to appear different from other magazine covers in the newsstand or store, and help to drive sales of the magazine brand. As a graphic designer designing a magazine cover, you need to know what will print well.

Explanation:

just took the test and did well youre welcome hope this helps

What occurs when a system produces incorrect, inconsistent, or duplicate data?.

Answers

Answer: Data integrity issues

Explanation:

Different between data and information

Answers

Answer:

The difference is simple Look in explain part.

Explanation:

Data is the raw facts that needs processing.

Data is the inputed question or equation that the use

gives.

Information is the processed data that has a meaning.

It is the out put of the inputed data that we gave to the q

computer/device .

HOPEFULLY THIS WAS HELPFUL

Will : 2*1*3 get tommyinit off of the screen or no explain your answer

Answers

Answer:

2 to the 1 to the 1 2 3 please get tommyinnit off my screen, yes

Explanation:

his unfinished symphony

If you need to multiply 50 and 8 and divide by 2, what would you type on the numerlc keypad?
50/8/2
50/8'2
50'8/2
50'8'2

Answers

Answer:

50*8/2

The asterisk is the multiplication sign and the parenthesis is the division.

I've never used an apostrophe for a multiplication sign before, but I'm guessing multiplication is what it stands for.

Explanation:

Electronic mail can be sent and received through any ___________ account

Answers

Answer:

main

Explanation:

it must be your main account

When Web site visitors are involved in downloading malicious code without their knowledge, they may be unknowingly involved in what type of process

Answers

Answer:

Drive-by download

Explanation:

The unintentional download of malicious code onto a computer or mobile device that exposes users to different types of threats.

A thesis statement is the last sentence of the conclusion. It summarizes the entire paper.
True
False

Answers

False. A thesis statement usually introduces the topics or ideas you are going to write about, so this means that it is at the end of the FIRST paragraph.

Answer:

false

Explanation:

Other Questions
whats going on in this attachment help thanks xD what is the answer?? Of all the deaths that may be experienced in childhood, the most affecting is likely to be the death of a What is the name of the structure that the microtubules blind to on the chromosome What is the key difference between the Suez and thePanama Canals? When did the united states house of representatives pass a bill in support of pi day. Find the value of 2x 4 given that -5x 1=4. Simplify your answer as much as possible Emma has a coupon for $5.25 off a frame that normally costs $15.00. What percent discount did she receive on the frame? Show your work in arriving at your answer. The SI unit of pressure is the _______. 00010000.00100010.10000100.10000001 8. Which of the following skills are the most helpful for a salesperson?O A. Quickness and accuracyO B. Addition and subtractionO C. Creativity and judgementO D. Active listening and communication Section 1 - Question 5Israel's economy is heavily based on the production of technology and services.How should Israel invest its money to see the greatest increase in gross domestic product (GDP) per capita?OA Promote educational programs to diversify the economy.OB Build more factories to create more computer producing jobs.Promote irrigation programs to increase agricultural production.Develop more efficient methods to produce technological products A common activity like cooking a meal can use many natural _________. what caused political paralysis in the gilded age How is the mass of an object different from its volume What is the radius of a circle with an area of 50. 24 square inches? Use 3. 14 for pi. Enter your answer in the box. An altitude is drawn from the vertex of an isosceles triangle, forming a right angle and two congruent triangles. As a result, the altitude cuts the base into two equal segments. The length of the altitude is 25 inches, and the length of the base is 20 inches. Find the triangles perimeter. Round to the nearest tenth of an inch. According to PA law, in order for child abuse to occur there needs to be an act or failure to act, a perpetrator and a' what river is the longest river in the Western Hemisphere The length of the hypotenuse of a right triangle is 50 inches. Determine the length of the legs if each leg is the same length.