how do I upending friend request? 100 POINTS!!!!

Answers

Answer 1

Answer:

If you want to send a friend request, click on their picture. Then scroll down slightly. There should be 3 buttons. The first one says Thank you. The next one is human with a +. Click the 2nd button. That is how to send a friend request.

Explanation:

Have a great day!

#EquestriansLion


Related Questions

PLS HELP MEE it's due in 2 minutes​

Answers

The answer is False, Double entry is a type of verification when you enter something 2 times to ensure it matches the original source.

Pauline has a well-established app with a large user base. Now she needs new users who complete valuable actions within the app. What phase does this fall under?

Answers

Answer:

Maturity because if you want new users who will complete [valuable]  actions they need to be [Mature].

Explanation:

90 POINTS Hazel is working with a database to help determine if the company she works for is making or losing money. Hazel has organized the expenses category from the smallest expense to the largest expense. Which of the following database features has Hazel employed to organize the data?

A.
sorting

B.
filing

C.
nesting

D.
filtering

Answers

Answer:

a

Explanation:

Answer:

it's A  sorting sorry if it's wrong

Explanation:

One new and creative method companies are using to advertise is:
A. stealing people's identities and pretending to be their friend.
B. promoting their products in television advertisements.
c. advertising products on the websites people visit the most.
O D. awarding prizes to users who follow them on social media.
SUBMIT

Answers

Answer:

c. advertising products on the websites people visit the most.

Explanation:

qbasic program to convert Nepali rupees into paisa​

Answers

Answer:

INPUT "What is the amount of rupees you want converted into paisa"; rupees

paisa = rupees*100

PRINT paisa

Explanation:

done in QBASIC
the semicolon in the 1st line makes the question have a ? at the end. the rupees key word in the 1st line saves the input as a variable

then the second line multiplies by 100 since there are 100 paisa in 1 rupee

4. is the disappearance of the individual a bad thing?

Answers

Answer:

The program completed in a third of the time with six computers versus one computer.

Explanation:

Which of the following best describes your sequence of actions when developing a web page?

Selected:a. Save the HTML file, Edit the HTML file, review the results, load the HTML file into the web browserThis answer is incorrect.
b. Edit the HTML file, save the HTML file, load the HTML file into the web browser, review the results
c. Review the results, save the HTML file, load the HTML file into the web browser, edit the HTML file
d. Load the HTML file into the web browser, edit the HTML file, review the results, save the HTML file

Answers

Answer:

I think D

Explanation:

Answer:

B

Explanation:

Saving it, then editing it wouldn't load the new changes

but editing it than saving it, would load the new Changes

30 POINTS!!!! HELPPPPP!!! in computer science, what does the term inference mean?
a. the wiring connection between the computer and all of its hardware devices
b. an internal switch inside the monitor that dims the screen's brightness at sunset
c. a device or program that allows a user to communicate with a computer
d. a sensor that turns the computer fan on when the computer gets too hot

Answers

Answer:

A. The act or process of reaching a conclusion about something from known facts

Hope this helps you!

Please Mark me Brainlest!!

Answer: c. a device or program that allows a user to communicate with a computer

Explanation:

A(n) ________ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on. A(n) ________ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on. wide personal local gateway

Answers

A personal area network is a type of wireless network that works within your immediate surroundings.

What is a personal area network?

A personal area network (PAN) is known to be a kind of computer network that has been made to function as an interconnecting electronic devices that is also found within an person's own workspace.

Note that a PAN is one that gives or helps in data transmission among devices such as computers, smartphones, etc.

Learn more about personal area network from

https://brainly.com/question/1167985

What can a company learn by studying website analytics for its website?.

Answers

Answer:

they can learn how people interact with it

Explanation:

Choose the response that best completes the following statement. (5 points) Simulation is the creation of a model that can be manipulated ________ to decide how the physical world works. creatively logically strategically virtually

Answers

Simulation is the creation of a model that can be manipulated  logically to decide how the physical world works.

What is the simulation of a model?

Simulation modeling is known to be the act of making  and analyzing a kind of digital prototype of a physical model to know  its performance.

Note that this modeling is often used to help designers and engineers to know if and what conditions ways or  a part may  fail and what loads it can hold.

Learn more about Simulation from

https://brainly.com/question/24912812

Match up each definition and term. Please help asap

Answers

Answer:

Query - Definition - Search by specific information Example - Find T-shirt in a specific size

Flat File Database - Definition - Simple database where each row is a record Example - Excel file of names and addresses

Fields - Definition - Different types of data for each record (columns) Example - Type of clothing, colour, size, price

Sort - Definition - Show records in different order based on its fields Example - Arrange all records alphabetically by colour

Record - Definition - Main item in a list (row) Example - Jeans

Text Field - Definition - Any number, letter, and all symbols Example - Levi's 518

Date Field - Definition - Date in a specific format Example - 2020-06-30

TIME Field - Definition - Any format of a timestamp Example - 10:42 PM

Graphic Field - Definition - Any kind of image Example - Logo

Calculated Field - Definition - Contains a formula to work something out Example - Length of time item has been in inventory

Number Field - Definition - Contains numbers that may be used in future calculations Example - $237.42

Brainlist Pls!

A router is connected to a network 192.169.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0. The router receives a packet addressed to the network 10.1.0.0/16. What will the router do with the packet.

Answers

Answer:

Forward the packet to the next hop router specified by the route network 0.0.0.0

Explanation:

What standard tcp port is reserved by iana for the openvpn service to operate on?

Answers

Answer:

1194 is the OpenVPN port reserved by the IANA

Explanation:

Blake is on the fast track and hopes to get a promotion soon. he wants to make sure that he is always able to
work at peak proficiency on the job. he has done a great deal of work and has numerous essential files that are
crucial to his job. he uses this utility to make sure these files are saved on the office's external hard drive.

a.remote control
b.firewall
c.file compression
d.backup

Answers

Answer:

D

Explanation:

Look at the color key below the map that shows the overall performance range. What is the range for 1 Year Performance? How does it compare to the 1 Day Performance range?

Answers

A performance range simply means the threshold and maximum percentage of shares that may become earned.

What is a performance range?

Your information is incomplete. Therefore, an overview will be given. A performance range is the maximum percentage if shares that may become earned shares due to the attainment of the requirements of the performance.

It should be noted that in this case, the opportunity to incentivize performance will be associated with the relative performance.

Learn more about performance on:

https://brainly.com/question/26256535

Which of these is most likely to contribute to the long term of a local ecosystem?

Answers

i would help but you didn’t say what these is

____ is a very fast network media. It contains multiple (sometimes several hundred) clear glass or plastic fibers, each about the thickness of a human hair. Each fiber has the capacity to carry data for several television stations or thousands of voice conversations, but each fiber can only send data in one direction. Data sent over a fiber-optic cable is represented by light pulses and is sent at speeds of up to trillions of bits per second

Answers

Fiber optic cable (FOC) is a very fast network media and it comprises multiple clear glass or plastic fibers.

What is a fiber optic cable?

A fiber optic cable can be defined as a type of wired connector which are either made of glass or plastic and they are typically used for connecting one network device to another, so as to form a computer network and enable the continuous transmission of data between them.

In Computer technology, fiber optic cables (FOCs) are commonly produced through the use of several concentric layers of transparent material such as glass or plastic, with each having a slightly different index of refraction for light waves and about the thickness of a human hair.

Read more on fiberoptic cables here: https://brainly.com/question/116766

Give 3 reasons why it is believed that smart phones precent us from communicating face to face.give three reasons why it is believed that smartphones prevent us from communicating face to face ​

Answers

Answer:

yes

Explanation:

because the people will be lazy to go and talk to that person instead They will call each other and discuss

how does computer science help in dance

Answers

Do not troll, I will be writing you up.

Spammers can defeat the registration process of free email services by launching a coordinated attack that can sign up for thousands of untraceable email accounts. what is this type of attack known as:_____.

Answers

Answer:

DDOS OR DOS

Explanation:

im sure its either DOS or DDOS(distributed denial of service)

What is one major reason various industries have adopted the use of automated robotic assembly?.

Answers

The major reason various industries have adopted the use of automated robotic assembly is to increase manufacturing productivity.

What is automated robotic assembly?

Automated robotic assembly is the use of automotive technology to operate different areas in the manufacturing industries.

Automated robotics are used to perform the following tasks:

welding, assembly,shipping, handling raw materials, andproduct packing.

The reason why various industries have adopted the use of automated robotic assembly is that it saves time and there is increase in the amount of products manufactured that when manually handled.

Learn more about automation here:

https://brainly.com/question/11211656

10) ________ objects control the flow of the application. A) Boundary B) Utility C) Control D) All of the above

Answers

There are different kinds of applications.  Control objects control the flow of the application.

What works the flow of control in a program?

In computer, control flow or flow of control is known to be a type of an order function calls, instructions, and statements.

They are known to be used in the execution or in an evaluation when a specific program is running. Note that a lot of programming languages have the control flow statements, that helps to know the section of code is run in a program at any given time.

Learn more about application from

https://brainly.com/question/23275071

75 POINTS!!
PLS HURRY
Choose the term that best completes each sentence.
___are intentional attacks on a system with the intent to do harm.
a. cyberthreats
b. malware
___ may be intentional like a virus or unintentional like a fire or human error.
a. cyberthreats
b. malware

Answers

Malwares are intentional attacks on a system with the intent to do harm.

Cyberthreats may be intentional like a virus or unintentional like a fire or human error

Hope that helps!

A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what should the IT security department implement to prevent this type of mishandling of confidential information

Answers

Save the passwords to an encrypted database, saving the passwords as hash values to keep confidentiality.

write the algorithms for the problem How to post a letter ? you can put pictures for the steps ​

Answers

❖ Step 1: Start

❖ Step 2: Write a letter

❖ Step 3: Put in envelope

❖ Step 4: Paste stamp

❖ Step 5: Put it in the letter box

❖ Step 6: Stop

[tex]\frak{\fcolorbox{black}{pink}{Black Pink in your area$~$}}[/tex] ~←(>▽<)ノ

What are 4 componenetas llk computers have in common

Answers

Answer:

Input, storage, processing, and output.

Explanation:

hope this helps you

Social media tools allow you to connect with people anywhere in the world who share your interests evaluate your interactions with people living outside the United States using various Social media tools how his influences how do you break cultural stereotypes and discover the local activities career aspirations in sports preferences of people from other cultures what is a social media tools that you used to form these connections explain how these connections have been influenced you, providing specific examples

Answers

The social media tools that you used to form these connections are:

Buzz Sumo. Go ogle Trends. Buffer Publish.Can va. Un splash

What are social media tools?

Social media tools are known to be key tools that are used for the running of business so as to handle important ways in their Digital Marketing routine.

The social media tools are important because it helps one to plan ahead and also  ensure that a person post the type of content needed to reach your goals and grow one's business.

Learn more about  social media from

https://brainly.com/question/3653791

Web résumés allow you to include extra graphics and images that you would not include in a traditional résumé. Please select the best answer from the choices provided T F.

Answers

A web resume is far better than a traditional resume because it can carry so much data about the person, and it includes images also. This statement is true.

What is a web resume?

A web resume is termed as a resume that is read by a computer program that summarizes the information of each employee.

Web resume has the data such as their parent name, education, skills, job experience, hobbies, languages, and so on.

Thus, the photo of the document about the project or internship that has been done in the past can be given on the web resume by uploading the certificate on the computer system along with the resume.

For example, in companies like Linkedin, apna, and so on there are many companies that ask about the person before creating an account.

More about the web resume link is given below.

brainly.com/question/862477

Answer:

true

Explanation:

What is a critical consideration on using cloud-based file sharing and storage applications.

Answers

Answer:

a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Determine if the software or service is authorized. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet.

Pls mark me as brainlist

This is a critical consideration on using cloud-based file sharing and storage applications to determine that Determine the software program or provider is authorized.

What are the Indicators ?

It is of a capability insider chance may be damaged into 4 categories--signs of: recruitment, facts collection, facts transmittal and preferred suspicious behavior.

Determine if the software program or provider is authorized. A coworker desires to ship you a touchy record to study even as you're at lunch and also you most effectively have your private tablet.

Read more about the cloud-based file:

https://brainly.com/question/24228581

#SPJ2

Other Questions
The osmothque in france is a specialized library of what?. PLEASE HELP!! 50 POINTS!!Instructions: Find the missing side. Round your answer to the nearest tenth. Nine people were asked, "How many times have you been on an airplane?" Their responses are listed below. 6,9,1,19,1,6,8,1 find the range and the mode for the datapleaseeee helpppp Could blood on the clothes of a murder suspect be used to implicate him in the crime? Which of the following questions would not help you to analyze your audience? A.How interested are my readers in my topic? B.Which genre best meets my needs?C.How informed are my readers about the topic?D.What information do my readers expect from my writing? The process in which a gas turns back into a liquid is called __________. What word completes the sentencA helium balloon's temperature is raised by 1C. Will this cause its molecules to move faster or slower?e? a machine prints 1500 newspapers in 45 minutes how many does it print in 12 hours Find the volume of the prism in terms of y. What are any tricks for remembering the Pythagorean theorem? What was the official language of the catholic church in the medieval period? A dinner plate has a circumference of 113.04 cm. What is the area of the dinner plate? (Use 3.14 for .)A. 226.08 cm2B. 2,034.72 cm2C. 1,017.36 cm2D. 56.52 cm2 Solve this problem please and thank you. Which of these organisms has a sac body plan, and radially symmetry? Make a history timeline about the system or method of Spanish conquest. Just choose (2) two methods and state its good and bad effects on the lives of Filipinos by composing a paragraph of at least 12 sentences. You can put it in a word document and attach it. Which narrative point in the story creates the most suspense?A) when the lead merchant begins singing for the danceB) when the 10 merchants are returning home with a lot of moneyC) when the clever merchant pondered over how to defeat theD) when the thieves Force the merchants to strip down to loin cloths Western Europe is best known for being the __________.A.melting pot of culture and diversityB.home of the first humans on EarthC.land of beauty and enchantmentD.beginning of Western civilizationPlease select the best answer from the choices providedABCD Knowledge Check Write the ratio as a fraction in simplest form, with whole numbers in the numerator and denominator. 4.5 ft to 2 ft . Radiation travels at the speed of lightT or F? Do imports threaten the jobs of people in the importing country? What number (X) comes next in the series (17, 9, 18, 7, 19, 5, 20, X) 3 4 16 21 23