What does this mean? it is coming after i ask a question

Don't use such phrases here, not cool! It hurts our feelings :(

Answers

Answer 1

Answer:

To my own opinion I think it means that when you're answering a question here in brainly I think they are referring that your message is rude but sometimes you are not rude but I don't know. Maybe it could be some difficult technical problems.


Related Questions

Rachel is a junior system administrator for a network with a single Active Directory domain. The network has just expanded to include an additional subnet. Rachel has installed a new server running Windows Server 2016 on the new subnet and configure it as a DHCP server. When she checks the server icon in the DHCP Management console, she notices the server has a down icon. The DHCP server service has started, but the server does not respond to DHCP lease requests. What should Rachel do to solve the problem

Answers

Answer: Ask a member of the Enterprise Admins group to authorize the server.

Explanation:

From the information given, we are informed that Rachel installed a new server running Windows Server 2016 on the new subnet and configure it as a DHCP server but then realizes that the DHCP server service has started, but that the server does not respond to DHCP lease requests.

In this case, the reason for this can be attributed to the fact that the server hasn't been authorized, therefore, she can ask a member of the Enterprise Admins group to authorize the server.

Select the correct answer for each question.
Which of the following ports offers a fast
connection that could be used to download and
watch your favorite TV shows?
O Etherne
O modem
O FireWire
O USB
DONE

Answers

Answer:

USB

Explanation:

it is a standard cable connection for consumers electronics devices.

an interface are connection point with hardware devices are joined​

Answers

Answer:

Explanation:

Networking hardware is the correct answer

Name of the best Android keyboard
Pls I need it asap!! For educational purpose
I need your Ideologies​

Answers

I think Gboard is good, you can switch between languages quickly and you can translate in real time. Translation is not perfect, but it is the best translation available. Vocabulary and autocorrect is not bad too. You can change the background. It has some themes of its own, but you can always customise it with your own photo. It has instant gif, stickers and emoji options too. It also has a good collection of symbolic emojis like: *\0/*O_o(๑♡⌓♡๑)ᕙ( • ‿ • )ᕗ(☉。☉)!I cannot include all of them, they are in 100s.

But if you are looking for a solution for grammatical mistakes, then you may want to consider Grammarly.

[tex]\boxed{\underline{\bf \: ANSWER}}[/tex]

Well, just like the person before me has answered ; I prefer Gboard, a keyboard provided by Go.ogle over all the other options ones available while using android. As you can see in the attached picture, I use Gboard & have been using it for quite a lot of years now as well. Gboard provides smooth surface for typing & there's glide technology as well. There's an option to pin your clipboard (which I find really helpful) & tons of built-in emojis, emoticons (this feature is not available in many), GIFs & so on. Also you can customize your keyboard by changing themes (you can either select one of the many backgrounds they have or choose one you like; in my case I have a blue scenery clipart as my background which matches my phone's overall theme). You can also use Gboard if you prefer to text in more than 1 language (this feature is available in many other keyboards as well though).

Now moving on, I would suggest the Samsung Keyboard too (that is, of you are using Samsung gadgets). The only reason I prefer Gboard over this keyboard is because you can't customize Samsung Keyboard (you can only choose White/Dark mode). Also, emoticons aren't available.

Then at last, there's the Grammarly Keyboard. This keyboard is really good if you are looking for writing essays, paragraphs or speeches as it catches all your grammar errors. But at times, it can be a bit too much & the keyboard is not overall smooth to use (at least for me).

So there, these 3 are the best keyboards for Android users.

_____

Hope it helps.

RainbowSalt2222

What kind/category of wallpapers do you prefer for your phone, tablet, or iPad??

Answers

Answer:

Overview of a place.

Explanation:

It has more meaning when you see an overview of a place. But it could be a thing too.

Answer:

Explanation:

It has more meaning when you see an overview of a place. But it could be a thing too.

Write a python program to calculate the sum of numbers from 1 to 20 which is divisible by 3.

Answers

Answer:

Input : N = 5

Output : 7

sum = 3 + 4

Input : N = 12

Output : 42

sum = 3 + 4 + 6 + 8 + 9 + 12

Answer:Input : n = 2, number = 7

Output : 728

There are nine n digit numbers that

are divisible by 7. Numbers are 14+  

21 + 28 + 35 + 42 + 49 + .... + 97.

Input : n = 3, number = 7

Output : 70336

Input : n = 3, number = 4

Output : 124200

Explanation:

What is computer system ?​

Answers

Answer:

a system that is a computer

Answer:

Invertebrates are animals that neither possess nor develop a vertebral column, derived from the notochord. This includes all animals apart from the subphylum Vertebrata. Familiar examples of invertebrates include arthropods, mollusks, annelid, and cnidarians

When a statement within a try block causes an exception, the remaining statements in the try block Select one: a. are executed after the statements in the catch block b. are executed before the statements in the catch block c. aren't executed

Answers

In C++, 'Try block' comprises of a group of statements in which there is a probability of an exception to take place.

C). The statements that would be left in the try block in case a particular statement leads to an exception 'can't be executed.'

In case an exception takes place, the left statements in the try block fail to function. This is the primary reason for which a catch block immediately succeeds a try block in order to deal with the exception and help close that code to allow the statements to work. Thus, option C is the correct answer.

Learn more about 'Try block' here:

brainly.com/question/14186450

How many bits would be needed to count all of the students in class today? There are 40 students.

Answers

Answer:

You would need 8 bits.

Explanation:

pls mark brainliest

this help me please. ​

Answers

Answer:

1) 1011010

2) 1100100

3) 1010101

4) 23

5) 22

6) 24

What is AI? Differentiate between 1G and 2G computer.​

Answers

The simulation of human intelligence in machine that are programmed to think like humans and feel the emotions and mimic is called AI

It stands for Artificial Intelligence

1G use analog signal for communication

2G use digital signal for communication

I hope it helps and if you want to have good answers follow me ,believe me I will help you in every question ♥️♥️

Answer:

Artificial intelligence (AI) is intelligence demonstrated by machines, as opposed to the natural intelligence displayed by humans or animals.

It's difference is given below:

1. 1G stands for first generation. While 2G stands for second generation.

2. 1G uses circuit switching. While 2G circuit switching as well as packet switching.

3. In 1G, internet is not provided. While in 2G, internet is provided.

4. The voice signal of 1G is analog signal. While the voice signal of 2G is digital signal.

5. The data services in 1G are not provided. While in 2G, data services are provided except complex data(videos).

6. The channelization protocol in 1G is FDMA. While the channelization protocol in 2G are TDMA and CDMA.

7. 1G was launched in the year 1980. 2G was launched in the year 1993.

What are the factors affecting the life of ballast? Explain.​

Answers

Answer:

When it's too hot or too cold.

Explanation:

When a bulb of the wrong size or voltage is used in the fixture, the ballast often overheats, causing the light to shut off. The bulbs and the fixture must also match in frequency, or the ballast becomes overworked and overheated.

You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network

Answers

You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network will have multiple wireless access points. You want to use WPA2 on the network. What should you do to configure the wireless network?

(Select two).

a. Use shared secret authentication

b. CONFIGURE DEVICES TO RUN IN THE INFRASTRUCTURE MODE

c. Configure devices to run in ad hoc mode

d. Use open authentication with MAC address filtering

e.  INSTALL A RADIUS SERVER AND USE 802.1X authentication.

 

Kolom terakhir pada lembar kerja Excel 2019 adalah​

Answers

Answer:

Tahan CTRL dan tekan tombol panah kanan (tombol kursor) pada keyboard. Anda dibawa ke kolom paling kanan. Dalam versi Excel modern, ini adalah kolom XFD, yaitu 16.384 kolom. Di versi Excel yang lebih lama (2003 dan sebelumnya) kolom terakhir adalah IV yaitu 256 kolom.

in english

Hold down CTRL and press the right arrow key (cursor key) on the keyboard. You are taken to the right-most column. In the modern versions of Excel this is column XFD, which is 16,384 columns. In older versions of Excel (2003 and prior) the last column was IV which is 256 columns.

What does RoHS stand for and why is RoHS compliance important?

Answers

Answer:

It stands for Restriction of Certain Hazardous Substances.

Web search says it is important because,

RoHS compliance dovetails into WEEE by reducing the amount of hazardous chemicals used in electronic manufacture. Put another way, RoHS regulates the hazardous substances used in electrical and electronic equipment, while WEEE regulates the disposal of this same equipment.

Explanation:

a key part of staying safe is employing good habits. drag the step number to the proper sequence triple a

Answers

Answer:

where are the step number. I can't find any

write the function of storage unit​

Answers

Answer:

A storage device is any type of computing hardware that is used for storing, porting or extracting data files and objects. Storage devices can hold and store information both temporarily and permanently. They may be internal or external to a computer, server or computing device.

please mark me as brainliest

A router on the border of your network receives a packet with a source address that shows it originating from a client on the internal network. However, the packet was received on the router's external interface, which means it originated somewhere on the Internet.

Answers

Answer:

The answer would be Spoofing

define data and user with example​

Answers

Answer:

Any data the user creates or owns. The term user data may be used to emphasize that the data were created and owned by the user. For example, when deleting an application, an uninstall program may ask if user data is also to be deleted.

Explanation:

Hope this helps you. Have a nice day^_^

You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority.
Which of the following is the BEST course of action in this situation?
A. Install a HomeGroup to provide a single login and simplify security and sharing.
B. Install a WorkGroup to provide a single login and simplify security and sharing.
C. Install a WorkGroup to allow each device to control what is shared and with whom.
D. Install a HomeGroup to allow each computer to control which items are shared and who can access them.

Answers

Answer:

I will choose a option tin best

Answer: Install a WorkGroup to allow each device to control what is shared and with whom.

Explanation:

whats the recommended amount of dedodated wam
i can have in a server

Answers

Hi! The recommended amount of RAM that you should have is 6gb and above.

A device is a program that must be installed in order for the peripheral device to be able to
work with the computer or laptop.
O prompter
O connector
O driver
O assister

Answers

Hii ! Soooo I think the suitable option for this one would probably be connector and also I had to look up a connector and I really think it could be the answer! If not I am sooo sorry for wrong one aha

In most cases; for a peripheral to work properly, a software must be installed on the computer, the peripheral is to be connected to.

The software is called (c) device driver

Some peripherals (such as mouse, keyboards, external Bluetooth, joysticks etc.) require that the user of the computer installs device driver on the host system.

Without the device driver installed, the following are the possible effects

The peripheral will not work at allThe peripheral will not function properlyThe peripheral causes the computer not to function optimally

Hence, (c) driver is correct

Read more about device drivers at:

https://brainly.com/question/14308161

An ordinary office environment needs computers that have multiple user account settings where each user is allocated private data storage. What type of workstations would you build for this environment

Answers

Answer:build a thick client

Explanation:

please help me to solve this Question ​

Answers

Answer:

SHOPKEEPER$ = "Chocolate"

Explanation:

what is known as Ip address

Answers

Answer:

IP address stands for internet protocol address; it is an identifying number that is associated with a specific computer or computer network. When connected to the internet, the IP address allows the computers to send and receive information.

The attacker sent data that was able to manipulate the return address that is reserved to store expected data

Answers

Complete Question:

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions?

Answer:

A buffer overflow.

Explanation:

In Computer science, a buffer can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM).

In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.

For example, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.

In this scenario, the vulnerability exploit which resulted from the attacker's actions by manipulating the return address that is reserved to store an expected amount of data is referred to as a buffer overflow.

Why is Charles Babbage is known as the father of computer?​

Answers

Answer:

Charles Babbage is known as the father of computer because he invented a machine called Analytical Engine, which is a model of today's computers.

have a great dayyyy

0.3. Fill in the blanks,7marks
a. A smart____uses IoT to save electricity.
b._____are devices that can sense , store and analyse signals from the body and display the information on the gadget and an app.
c. The full form of CSS is_____.
d. The syntax of CSS is made of_____
and_____.
e._____CSS is used to beautify one particular tag.
f. Internet of Things makes use of connected devices, smartphones and_________.
g._____track the number of steps a person has walked in a day.​

Answers

Answer:

a) phone

b)

c) cascading style

What is the difference between Packaged and tailored soft ware?​

Answers

Answer:

Package software is developed by computer technicians. modified or changed if there is need because these software are custom-built. Tailored Software- Tailored software is the software that is developed as per the specifications and requirements of the users.

Explanation:

hpithlps.

4) Programming a) WAp to find the greatest number among any three numbers.​

Answers

def comp_num (num1, num2, num3):

try:

if num1 > num2 and num1 > num3:

print ( "{0} is the biggest".format(num1) )

elif num2 > num1 and num2 > num3:

print ( "{0} is the biggest".format(num2))

elif num3 > num2 and num3 > num1:

print ( "{0} is the biggest".format(num3))

except ValueError:

return "Invalid input"

num_1 = int (input (" Please enter a number: "))

num_2 = int (input (" Please enter a second number: "))

num_3 = int (input (" Please enter a third number: "))

print (comp_num (num_1, num_2, num_3))

Answer:

this is in qbasic programming

Other Questions
Which type of laws are passed by Congress and affect all states? federal lawsorstate laws Select the correct answer from each drop-down menu.The table represents function f, and the graph represents function g.-2- 112340Ax)70-5-8-9-8-5A642gX.-2122The line of symmetry for function fisand the line of symmetry for function gisThe y-intercept of function fisthe y-intercept of function g.Over the interval [2, 4], the average rate of change of function fisthe average rate of change of function g. Lusine saw birds and mice eating seeds on the ground. She calculated 12 heads and 39 legs in total. How many birds and mice are on the ground? Write the ratio as a fraction in simplest form with whole numbers in the numerator and denominator Step by step on how to do this plz Importance of skilled human resource ? What do political parties do? 5, 10, 12, 4, 6, 11, 13,5calculate the mode Suppose you buy 6 cans of peaches at $1.10 each, 5 cans of corn for $.89 each, and 3 boxes of breakfast cereal at $3.52 each. a. Write three expressions; one each that shows how to determine the total spent on peaches,corn and breakfast cereal. (3 pts) solve by factoring x^2-x -30=0 find the surface area of each figure. Round to the nearest tenth if necessary. In a bag there are red, green and purple counters. 38 of the counters are red, 16 of the counters are green. What fraction of the counters are purple? What is the academic qualificationrequired fro the scientists profession? Ang Also mentionfive duties or a responsiblity ofthatanyprofession? Glycolysis and gluconeogenesis are opposing pathways in that they begin or end with the same metabolites and share common intermediates and/or enzymes. Yet, for energetic reasons, the two processes cannot be the exact reverse of each other. How is this possible how is the frictional force produced? What is the value of n to the nearest whole number?O 10o 1318o21 In paragraph four of Federalist No. 10, how does Madison justify his assertion about extensive republics?Click here to read the excerpt.A. He asserts only that better candidates will be chosen if a large number of citizens are participating.B. By withholding further relevant support, he stands by his opinion as originally stated.C. He asserts that the large republics present the greater probability of a fit choice of representatives.D. After making the assertion, he offers two obvious considerations that support it. 1. Aristotle writes in his essay Politics, But justice is the bond of men in states, for the administrationof justice, which is the determination of what is just, is the principle of order in political society."What do you think Aristotle meant? How does this relate to our society today? (10 points) what are applied areas of mycology? Find the indicated side of thetriangle.730ba = [?]