Does anyone have a leg pet on adopt me? Ty!

Answers

Answer 1

Answer:

no

Explanation:

Answer 2

I have a legendary pet in adopt me, these are the legendaries im TRADING:

frost furry, ride or fly kitsune, mega neon owl (Traded), and kangeroo (traded).

are you interseted in anything?


Related Questions

What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.

Answers

Answer:

a,b,c,e

Explanation:

Answer:

Quit your bickering in the replies on the other answer, this is correct.

Explanation:

Jon wants to set up a trihomed DMZ. Which is the best method to do so? A. use dual firewalls B. use a single firewall with only two interfaces C. use a single three-legged firewall with three interfaces D. use dual firewalls with three interfaces

Answers

Answer:

The correct option is C) Use a single three-legged firewall with three interfaces

Explanation:

DMZ is an acronym for a demilitarized zone.

A DMZ network is one is situated between the internal network and the Internet. It is supported by an Internet Security and Acceleration (ISA) server.

The interfaces you'd get with the DMZ network are

A public network (Internet Protocol-IP) address  with a public interfaceAn internal network interface with a private network (IP) address  A DMZ interface with a public network (IP) address  

Unlike the back-to-back DMZ settings, a trihomed DMZ is unable to use private IP addresses. To use the trihomed DMZ, public IP addresses are a must suitable requirement.

Cheers!

HELP!!!!!
Your colleague has made a suggested change to an important document you are both working on. You disagree with their suggested change. They will be reviewing the changes you make before the final version of the document is submitted to your boss. You both work remotely and are in radically different time zones. What is the best step to take next?

Answers

Leave the room and let someone else figure it out!

What is the output of the following code:
lang=
['Python','C','C++, JAVA,ASP'PHP',VB', Oracle
'MySQL)
list1 = lang(2:-2]
list2 = langl-2:-5)
list3 = langl: : 3]
print(list)
print(list)
print(list3)​

Answers

Answer:

Syntax error.

Explanation:

There are many typing mistakes in this source code.

I need help pleaseeee

Answers

Answer:

The Answer is C. Hope you get it right, Good Luck!!!

Answer:

The answer is B

Explanation:

To create a list, paragraph, or unordered list, you should use HTML code, whereas in CSS coding, you can change the overall font size of a tag using the font-size=(number) tag.

Question 1 (10 points)


When using MLA format your font type and font size should be what?
Question 1 options:


Rockwell 12


Calisto 11


Times New Roman 11


Times New Roman 12
Question 2 (10 points)


What tab would you go to to add citations to your paper so you can include your source information?
Question 2 options:


Insert


Design


View


References
Question 3 (10 points)


What tab do you go to to put a header on your paper
Question 3 options:


References


Insert


Layout


Home
Question 4 (10 points)


When the same word is used in multiple locations or a word is used that was not quite appropriate, a thesaurus can be used to look up a (n) ____________ or word similar in meaning.
Question 4 options:


Synonym


Homonym


Antonym


Metronym
Question 5 (10 points)


In Word you can force a page break
Question 5 options:


By positioning your cursor at the appropriate place and pressing the F1 key


By hitting the enter key twice really fast


By clicking the Insert Tab and selecting Page Break in the ribbon


By changing the font size of your document
Question 6 (10 points)


In your ruler there are two triangles. The triangle on top that points down is called
Question 6 options:


First Line Indent


Hanging Indent


Tab


Left Indent
Question 7 (10 points)


Which would you choose to save a document with a new name?
Question 7 options:


Press Ctrl+S


Click File, Save


Click Tools, Options, Save


Click File, Save As
Question 8 (10 points)


To put a ruler on your screen to help you with spacing and alignment on your paper you would go to this tab
Question 8 options:


Insert


References


Design


View
Question 9 (10 points)


User can use ______ commands to search for and correct words in a document
Question 9 options:


Copy and Paste


Find and Replace


Header and Footer


Print and Print preview
Question 10 (10 points)


What tab do you go to for the spelling and grammar check?
Question 10 options:


Home


Review


Insert


File

Answers

Answer:

Find and replace header and footer

Which kind of a person will you be if you prove to be accountable for your actions?

Answers

Answer: You would be a person of integrity.

Explanation: Look up Integrity for details.

Justify the use of an e-diary in the organisation of the meeting.

Answers

Answer:

It can be used to easily organize stuff

Explanation: It can be easily used to organize meetings & write important stuff, and you will also never run out of pages, which is better than having no diary.


a.
Define a computer with its proper meaning.​

Answers

Answer:

Computer

Explanation:

a programmable electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations.

Answer:

computer

Explanation:

An electronic machine that processes, stores data, and does calculations.

In most places of work, how long should it take someone to respond to an e-mail?

no obligation to respond

one hour

twenty-four hours

one week

Answers

Answer:

24 Hours

Explanation:

Now Ideally, someone when they are working should respond immediately, but its 24 hours because, if someone is in a different Timezone, Or you sent an email late and tehy read it at 12pm or something it allows them good wiggle room while giving you a dcently fast reply.

Answer: 24 hours

Explanation: It's correct

50 PTS
in Java
Write a program with a method called passwordCheck to return if the string is a valid password. The method should have the signature shown in the starter code.

The password must be at least 8 characters long and may only consist of letters and digits. To pass the autograder, you will need to print the boolean return value from the passwordCheck method.

Hint: Consider creating a String that contains all the letters in the alphabet and a String that contains all digits. If the password has a character that isn’t in one of those Strings, then it’s an illegitimate password!

Answers

import java.util.Scanner;

public class JavaApplication46 {

   public static boolean passwordCheck(String pass){

       String alphanum = "abcdefghijklmnopqrstuvwxyz1234567890";

       boolean legit = true;

       if (pass.length()>= 8){

           for(int i = 0; i < pass.length(); i++){

               if (alphanum.indexOf(pass.charAt(i)) != -1 && legit != false){

                   legit = true;

               }

               else{

                   legit = false;

               }

           }

       }

       else{

           legit = false;

       }

       

           return legit;

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.print("Enter a password: ");

       String password = scan.next();

       System.out.println(passwordCheck(password));

   }

   

}

I hope this helps!

A collection of computers, printers, routers, switches, and other devices
that can communicate with each other over some transmission medium
O network
O host part
subnet part
subnet

Answers

ermano envia foto de lo que necesitas yo te ayudo

Prepare a profile on major universities in the country Nepal ​

Answers

Answer:

Formal higher learning in Nepal began with the establishment of Tri-Chandra College in 1918, the first college in the country. Until 1985, Tribhuvan University (TU) was the only university in the country. The second university to be founded was Mahendra Sanskrit University. The inception of this university was soon followed by Kathmandu University in 1990, and Purbanchal and Pokhara Universities in 1995 and 1996, respectively. Many schools and colleges are run privately but none of the universities in Nepal are private.

This list includes all notable universities and colleges/campuses in Nepal. Entries are organised by courses offered, and listed in alphabetical order. Some entries that provide multiple courses may be duplicated in each of the relevant categories.

There are fourteen universities in Nepal. They are: Khwopa University (Proposed)

Agriculture and Forestry University in Chitwan

Far-western University in Kanchanpur

Gandaki University in Tanahun

Kathmandu University in Dhulikhel

Lumbini Bouddha University

Madan Bhandari University of Science and Technology

Manmohan Technical University in Biratnagar

Mid Western University in Birendranagar

Nepal Open University[1][2] in Lalitpur

Nepal Sanskrit University

Pokhara University in Pokhara

Purbanchal University in Biratnagar

Rajarshi Janak University in Janakpurdham

Tribhuvan University in Kirtipur

The university that will be profiled in their case is the Agriculture and Forestry University, Chitwan, Nepal.

The Agriculture and Forestry University, Chitwan, Nepal offers undergraduate, graduate, and PhD programs in agricultural sciences.

The university has several faculties such as the faculty of agriculture and animal sciences, fisheries, and aquaculture.

Learn more about universities on:

https://brainly.com/question/25853486

how to take a pic with a cumputer

Answers

Answer:

Ctrl+Shift+4

Explanation:

Answer:

Use Snip+Sketch on your taskbar

It looks like this~

If you're driving a car and know there's a motorcyclist around you, you should______. A. Not change your driving B. Check your blind spots frequently C. Remind them to wear a helmet D. Make wider turns than normal

Answers

b check your blind spots frequently i guess not sure

Which term means an unsecure protocol used when remotely accessing a computer?

Transmission Control Protocol (TCP)
Secure Shell (SSH)
Telnet
Internet Protocol (IP)

Answers

Answer:

9Internet Protocol (IP)

Answer:

The answer is Secure Shell (SSH)

Someone plz im begging for ur help plzz??

Answers

Answer:

woah what subject is this-

Explanation:

Seneca has just applied conditional formatting and realizes that she has made a mistake. Which action should she take to fix the mistake?

A) Clear the rule she created by going to the Conditional Formatting Rules Manager dialog box and deleting the rule.
B) Clear all rules that have been applied to the worksheet or selected range by clicking the Clear Rules button.
C) Use the Undo button or Ctrl+Z.
D) Right-click the area where the conditional formatting rule has been applied, and select Clear Rule from the menu list.

Answers

Answer:

its b

Explanation:

on edg

Answer:

b

Explanation:

PLEASE HELP!!
Computer networks allow computers to send information to each other. What is the term used to describe the basic unit of data passed from one computer to another?


message


package


packet


transmission

Answers

Answer:

Paquete de red o paquete de datos es cada uno de los bloques en que se divide la información para enviar, en el nivel de red. Por debajo del nivel de red se habla de trama de red, aunque el concepto es análogo. En todo sistema de comunicaciones resulta interesante dividir, la información a enviar, en bloques de un tamaño máximo conocido. Esto simplifica el control de la comunicación, las comprobaciones de errores, la gestión de los equipos de encaminamiento (routers), etcétera.

Al igual que las tramas, los paquetes pueden estar formados por una cabecera, una parte de datos y una cola. En la cabecera estarán los campos que pueda necesitar el protocolo de nivel de red; en la cola, si la hubiere, se ubica normalmente algún mecanismo de comprobación de errores.

Explanation:spero  teyaudee

Answer:

Packet

Explanation:

A data packet is the precisely formatted unit of data that travels from one computer to another.

(Confirmed on EDGE)

I hope this helped!

Good luck <3

Which of the following expressions shows the correct amount of sales tax for the computer at Store A? Select all that apply.
6%($1,200)
0.6($1,200)
0.06($1,200)
One-sixth($1,200)
StartFraction 3 over 50 EndFraction($1,200)

Answers

Answer:

6%($1,200)  0.06($1,200)  3/50($1,200)

Explanation:

hope this helps sorry if i am wrong

have a nice day

Answer:

a,c,e

Explanation:

it just makes sense U^U

Select the correct answer from the drop-down menu.
Chrissie shirks the additional work given to her.
She lacks the trait of

Answers

Answer:

Responsibility

Explanation:

The meaning of docile can be determined by the... context clue. synonym atonym or explanation

Answers

Answer:

Synonym

Explanation:

I'm pretty sure it's either synonym or explanation, but if there isn't an explanation, it's almost always synonym... so... synonym is correct.

Answer:

it is explanation

Explanation:

trust me

Need answer Asap!!!! Which file type is the best choice if the image will be made into a billboard?

Answers

Answer:

A .psd file

Explanation:

Adobe photoshop files are always going to be same and there is no compression. Even better .ai files are saved into equations so you can't alter or dumb it down.

Select all the lines that have a slope of 5/2

Answers

Answer:

Add a picture, then ask the question again.

The Quick Access tool bar allows you to customize the actions or commands you frequently use.

True
False

Answers

I believe its true.

Order the steps for accessing the junk email options in Outlook 2016
Select Junk Email Options
Click the Junk button
Select a message
Choose one of the protection levels
Locate the Delete group on the ribbon​

Answers

Answer:

To access the the junk email options in Outlook 2016, follow the following steps.

1. Click the Junk Button

This will take you to the Junk messages that you have.

2. Select a message

Select a junk message from the list.

3. Locate the Delete group on the ribbon

The Junk email options is located in the 'Delete' group on the ribbon in the Home tab.

4. Select Junk Email Options

Click on the Junk email options button and a popup window will appear.

5. Choose one of the protection levels

Select the protection level you want from the various options listed including low, high, automatic etc.

Answer:

select a message, locate the Delete group on the ribbon, click the junk button, select junk email options, choose one of the protection levels.

Explanation:

¿En cuales situaciones concretas se puede aplicar las técnicas de conteo(particularmente las permutuaciones y las combinaciones) dentro de la informática?

Answers

Answer:

In which specific situations can counting techniques (particularly permutuations and combinations) be applied within computer science? for anybody trying to help

While an image is still being editing, it is best to save it as a PDF. Group of answer choices True False

Answers

Answer:

f

Explanation:

No because when you save it, the new editing will not count.

Which component in a CPU is responsible for transferring
data from one functional component to another?​

Answers

The data bus carries data from components to others

ABC IF U HAVE A LEGENDARY PET ON ADOPT ME OR ANYTHING COOL!! <3

Answers

Answer:

ABC PLEASE

Explanation:

Answer:

ABC i have mega owl and neon cow and mega frost <3

Other Questions
Molten materials cool at different rates. Which property of a mineral does this affect?colorlustercrystal sizecrystal shape what role did the Quebec act play in the American colonies ? what is 3/4 x 2 5/6 please help me In the Prologue excerpt, why to you think the Wife of Bath asks the pilgrims NOT to be offended at her views as she will portray them in her tale?What is the Kings punishment for the Knight?Who begs the King to show the Knight mercy? How is this ironic?What does the Wife of Bath say hooks women to men?What does the old woman value most?This is for the wifes bath tale When converting 16/3 from improper to a mixed number, what will the whole number be? first one will get mark brainlist If y = 2 whenx1, find xwhen y = 4 5/ 2 x -14A. -10.3B. -6C. -5.6D. -5Which of these does not make the inequality true? What are the single sugars that are the building blocks of carbohydrates? 10 1/2 x 1/3 help me pls What happens to the atoms in a scoop of ice cream as it melts? They decrease in temperature. They lose energy. They vibrate faster. They are held tightly in a fixed position. please help me conjugate these. What is the frequency of a photon with an energy of 3.38 x 10-19 J? A family drove from home to truckee at 55 mph and returned the same route at 40 mph due to a snow storm. the total travel time was 4.75 hours. Determine the distance between their home and truckee DatePageA rectangular meadow has an area of 28 squaremeter and perimeter 22 m, find the length and breadth. The controversy surrounding the yazoo land fraud revolved around which issue? What color are the stars on the diagram with the lowest surface temperatures? Manuel 1. ( ) un estudiante en mi escuela. Manuel y sus amigos 2. ( ) inteligentes. Ellos 3. ( ) en la biblioteca. Juan, el hermano de Manuel, 4. ( ) perezoso. No le gusta trabajar. Juan 5. ( ) en el gimnasio. 6. Todos ( ) contentos. Whats the algebraic expression for 9,12,1518 a square has a perimeter of 52 mm. The square is dilated by a scale factor of 3. what is the side length of the resulting image? Please help! I really need help please I will give Brainliest!x + 2x + 12y + xPart A: Using the expression shown, add like terms and produce an equivalent expression.Please do B tooPart B: Rewrite your expression from Part A using the distributive property.