I need names for an anime and powers so plz make then unique

Answers

Answer 1

Answer:

Acid spit

Explanation:


Related Questions

to generate a series of first ten counting number of algorithm​

Answers

uhh i need points so i don’t fail math.

Ok can someone tell me why I can’t do this? I’m trying to put a video as my background but it won’t show up when I go to add video there is no video

Answers

Answer: money

Explanation:

Who knows songs that are sad,happy,excited, and calm

Tell me three 4 each i will give out brainliest

Also include the author

Answers

sad-

you broke me first

can we kiss forever

love the way you lie

happy-

Say Yes

Valerie

Walking on Sunshine

excited-

who let the dogs out

September

calm-

heather

put your records on

lonely

What is Ce stands for?
O Carbon character
O Carbon calender
Carbon copy
O character change​

Answers

Explanation:

hello I don't know ok sorry

Please help! Due by tonight! Greatly appreciated!

Answers

Answer:

Im sorry if im wrong but i took a class for coding a long time ago but i think  it is 6 :)

What is the size of 5th generation of computer and what language does they use??​

Answers

Answer:

The period of fifth generation is 1980-till date. In the fifth generation, VLSI technology became ULSI (Ultra Large Scale Integration) technology, resulting in the production of microprocessor chips having ten million electronic components

Fifth-generation languages are used mainly in artificial intelligence research. OPS5 and Mercury are examples of fifth-generation languages. as is ICAD, which was built upon Lisp. KL-ONE is an example of a related idea, a frame language

Explanation:

1980 until the present is the fifth generation's time frame. When VLSI technology evolved into ULSI (Ultra Large Scale Integration) technology in the fifth generation, microprocessor chips with 10 million electronic components were created.

What is 5th generation computer?

Artificial intelligence research is the principal application for fifth-generation languages. Examples of fifth-generation languages are OPS5 and Mercury. ICAD, which is based on Lisp, is also. KL-ONE is an illustration of a frame language, a related concept.

After the creation of the fourth-generation computers, the fifth generation was introduced. Modern computers, also referred to as fifth-generation computers, are currently under development and are based on artificial intelligence.

In 1982, the FGCS was developed in Japan (Fifth Generation Computer System). This generation of computers uses parallel processing and microelectronic technology, which has a high processing capacity.

Therefore, 1980 until the present is the fifth generation's time frame. When VLSI technology evolved into ULSI (Ultra Large Scale Integration) technology in the fifth generation, microprocessor chips with 10 million electronic components were created.

To learn more about computers, refer to the link:

https://brainly.com/question/21080395

#SPJ2

You are considering implementing a backup scheme for a server. After researching options, you decide on a method that does not reset the archive bit after a backup. Which method have you chosen?

Answers

Answer:

C. A cold site is a leased facility that contains only electrical and communications wiring, air conditioning, plumbing, and raised flooring. No communications equipment, networking hardware, or computers are installed at a cold site until it is necessary to bring the site to full operation.

Explanation:

explain Text align , Text Decoration, colour, Text shadow..​

Answers

Answer:

Text align, text decoration and text shadow are all some of the important features in CSS.

Explanation:

CSS is a programming language. It stands for Cascading Style Sheets. It is the style sheet language that is used for describing a presentation of any document that is basically written in HTML.

Text Align : This property allows the horizontal alignment of a text in an element. A text can be right align, left align, justified or centered.

Text Decoration : The text decoration features in CSS helps to set or helps to remove the decorations from the text. These are drawn across the descendant text elements.

Text shadow : This property simply allow us to add or put a shadow to the text.

Which symbol is used for exponentiation in QBASIC ?
Short answer​

Answers

Answer:

The symbol which is used for exponentiation in QBASIC is '^' .

1.portable hard drive is an example of internal memory true or false

2.Command i’m user interface are using currently true or false

3. Temperature sensor is an input device true or false

4. Draft few headers and footers are visible true or false

Answers

1. false

2. false

3. false

4.true

1.False
2.False
3.False
4.True

What are presenter notes?

Answers

Presenter notes are for showing to other people

Answer:

notes on like a presenting app that will help you present better so like your notes

Explanation:

please help please I will count your answer brainiest if you help!
In what ways are math and computer science similar? How are they different?

Answers

Answer:

Without mathematics, computer science would not exist. Computers use algorithms to obtain certain information, and output certain information. Linear equations and algebra are used to create gaming graphics.

Have you ever wondered how your online quizzes were made? Inside the online quizzes there is code behind it, this code uses variables, integers, and booleans.

Variables use equations like x and y to find sum. A boolean is a basic algebraic notation, it's a binary variable.

Everything uses math, nothing would exist without math, including even digging dirt.

Nadia has inserted an image into a Word document and now would like to resize the image to fit the document better.

What is the quickest way to do this?

keyboard shortcut
sizing handles
context menu
sizing dialog box

Answers

Sizing handles but I’m not super sure

in which genre of games do players most often have the power to shape how the story will end?

platformer games
shooter games
role-playing games
puzzle games

Answers

Role playgames are the most customizable

Answer:

role-playing games

Explanation:

How do you send friend requests?

Answers

Answer:

i dont know how too i dont think you can

A proprietary software license allows users to install and use the software on any number of computers. install and use the software after agreeing to the terms of the license. inspect, modify, and redistribute the software. copyright and resell the software.

Answers

Answer:

install and use the software after agreeing to the terms of the license.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

Hence, a proprietary software license allows users to install and use the software after agreeing to the terms of the license.

A proprietary software license allows users to install and use the software after agreeing to the terms of the license.

Thus, option (b) is correct.

Users are required to agree to these terms before they can legally install and use the proprietary software. The license agreement may outline specific restrictions, limitations, and permitted usage scenarios.

Installing and using the software on any number of computers: This is not necessarily true for proprietary software.

Inspecting, modifying, and redistributing the software: These activities are typically not allowed under a proprietary software license, as they generally provide limited or no access to the source code and impose restrictions on modifications and redistribution.

Copyrighting and reselling the software: These rights are typically retained by the software's copyright holder and are not granted to users under a proprietary software license.

Therefore, install and use the software after agreeing to the terms of the license.

Thus, option (b) is correct.

Learn more about Software installation here:

https://brainly.com/question/7548929

#SPJ6

The question attached are seems to be incomplete, the complete question is:

A proprietary software license allows users to :

install and use the software on any number of computers.install and use the software after agreeing to the terms of the license.inspect, modify, and redistribute the software.copyright and resell the software.

For each obstacle, select the best solution. failing to find other members for a club: failing a class: failing to get the credits necessary to graduate from high school: not having enough money to pay for culinary school: not getting a job or promotion:

Answers

Answer:                                                                                                             Failing an high school math class:getting study help,and retaking the class. Failing to get the credits necessary to graduate from high school: retaking any additional classes needed. not finding an apprenticeship opportunity: joining an organization or school that connects its members or students with apprenticeships. not finding a job: asking family,friends, and acquaintances about job opportunities.                                                                    

Explanation:                    

Answer:

getting study help

retaking any additional classes needed

joining an organization or school that connects its members students with apprenticeship

asking family, friends, and acquaintances about job opportunities  

Explanation:

Compared with traditional methods, the entire rapid application development (RAD) process is expanded and, as a result, the new system is built, delivered, and placed in operation much later.

Answers

Answer:

False

Explanation:

Note, the Rapid Application Development (RAD) software development approaches are noteworthy not for its expanded design details but for its simplicity of the software development process.

In other words, the RAD approaches while taking user preferences into the software development process, focuses on making the software design process more flexible, such as by employing the use of prototypes, and less unnecessary details.

A section at the top of the page that makes it easy for the recipient to respond to a letter is called a(n

Answers

Answer:

Address block.

Explanation:

Can someone please give me Python test 3 it would help me tremendously

Answers

Question 1:  To tell what will happen when an if-statement is false.

Question 2: The = should be ==

                    elseif should be elif

                    The else should have a :

Question 3: All algorithms can only do number calculations.  

Question 4: and

Question 5: To make a follow-up True/ False decision

Question 6: if (text1 > 15):

Question 7: if (text1 == 78):

Question 8: if (num1 != num2):

Question 9: >=

Question 10: 4

Question 11: 3

Question 18: a < b and a != b  

Question 19: !=

Sorry about 12 - 17 and 20 i can't seem to find those questions guessing you wanted edhesive. I dont have an account on it.

Brainly, ""helping you get better grades"
ahem im sorry but uh ur lying because i made a C on my exam and im really mad smh

Answers

Answer: What do you except? All of this is user generated..

Explanation:

Yikes- well I mean these are real people answering so they could make mistakes too

Write negative impacts of ICT in our lives. atleast 4​

Answers

Answer:

#1: Reduced physical activity

#2: Eye strain/ easily prone to headaches

#3: Poor social skills

#4: Decline in mental health

Answer:

Reduced physical activity: A third negative effect of ICT is that users may adopt a more sedentary lifestyle. This can lead to health problems such as obesity, heart disease, and diabetes.

Desktop computers are often provided in the workplace by organizations, and laptops may be as well. However, portable devices (such as tablets and smartphones) may more commonly be allowed on a BYOD basis. For a BYOD (personally-owned) device:

Answers

Answer:

Organizations may have requirements about how BYOD devices may be configured to access the information resources of the organization.

Explanation:

Desktop computers and laptops are often provided for the employees in the workplace. On a BYOD basis, portable devices such as tablets and smartphones may more commonly be used.

For a BYOD (personally-owned) device, organizations may have requirements about how BYOD devices may be configured to access the information resources of the organization.

when a plant responds to changes in the length of day by flowering during certain seasons,it is called​

Answers

Answer:

It occurs in plants and animals. Photoperiodism can also be defined as the developmental responses of plants to the relative lengths of light and dark periods. They are classified under three groups according to the photoperiods: short-day plants, long-day plants, and day-neutral plants.

PLEASE HURRY!!!
Wyatt has a database to keep track of an enormous collection of videos. How can Wyatt find the record for the game Lost on Mars?
a)sort the data
b)filter the data
c)query the data
d)edit the data

Answers

Answer:

Wyatt could sort the data by month

Explanation:

Creation of ____________will help you to study the behavior of the real system

Answers

Answer:

I don't know but....I think (Sorry if I am wrong)

Explanation:

Psychology

PLEASE HELP!!! You saved the definition of the vehicle class in a file called vehicleClass.py.


Which line of code will allow you to use the class in another program?


A. from * import vehicleClass

B. from vehicle import

C. from * import vehicle

D. from vehicleClass import*

Answers

Answer:

D. from vehicleClass import*

Explanation:

Answer:

from vehicleClass import*

Explanation:

ASAP! Due by tonight!!!! Please help!!!

Answers

The answer is C. Start of mystery

Answer: e

Explanation:

what is CPU ????....................​

Answers

Cumputor its just a short way to say it

Answer: Central Processing Unit

Explanation: The CPU is the “brain” of the computer. It means Central Processing Unit!

hope this helps ;)

To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, you can browse the internet, but you are unable to perform secure credit card transactions when making purchases from e-commerce websites. Which port needs to be enabled to allow secure transactions

Answers

Answer: 443

Explanation:

Port 443 will need to be enabled for secure transactions to go through because it is the default port for HTTPS which is the transfer protocol for secure communication.

This way your credit card transactions will be encrypted to ensure protection from those who would seek to steal your data and your money.  

Other Questions
2. Would you be able to get energy from food if there werent chemical reactions in your body? Find the value of the expression below How did trade in the Shang dynasty differ from trade in Egypt and Mesopotamia? f(x) = 2(x - 2)(x + 5) in standard form Essential Question: How do differing articulations influence the music and the effect on thelistener? Francisco is saving money in an account. At the beginning of the year, he has $56 in savingsand puts in another s4 per week. Which of the following equations models the amount ofsavings, s, as a function of the number of weeks, w, Francisco has been saving? to buy a given good or service.Demand is theandA. passion ... desireB. willingness ... abilityC. need ... opportunityD. motivation ... determinationPlease select the best answer from the choices providedPLZ I GIVE BRAINLIEST how do you break up with someone 2. Which of the following vectors is equal to vector with initial point (3, 7) andterminal point (-5, -3)?f. u= g. u = h, u =j. u = Determine whether the solution of each equation below is the same as the solutionof 3m - 36 - 6m.Choose Yes or No for each equation.-3m+ 2 = -1Yes Nob.-21-4m - 6,4) = 44.8Yes NoC.8m - 5 - 2m +1 - 20Yes Nod. 7m + 6 = 9m - 2Yes No Which purpose does civil law have? Please NEED HELP ASAP WILL MARK BRAINLIEST ONLY #8 please help answer brainlest each rock you need to tell where OK can you find themlike: your backyard or the roadFlakes of brickCracks in rocksLichen growing on rocksRoots or plant growth making cracks in concreteWorn away statuesExposed rocksRust on rocksExample You Found: help??????????????????? EnglishAccountants and auditors help ensure that a nation's firms are run efficiently, its public records kept accurately, and its taxespaid properly and on time. They analyze and communicate financial information for various entities such as individualclients, companies, and government institutions. Beyond carrying out the fundamental tasks of the occupation--preparing,analyzing, and verifying financial documents in order to provide information to clients-many accountants also offer budgetanalysis, financial and investment planning, infermation technology consulting, and limited legal services. Specific job dutiesvary widely among the four major fields of accounting and auditing: public accounting, management, governmentaccounting, and internal auditing Public accountants perform a broad range of accounting, auditing, tax, and consultingactivities for their clients, which may be corporations, governments, nonprofit organizations, or individuals. For example,some public accountants concentrate on tax matters, such as advising companies about the tax advantages anddisadvantages of certain business decisions and preparing individual income tax returns.Some internal auditors are involved in measuring an entity's compliance with the policies of an organization but are not apart of the execution process. Others offer advice in areas such as compensation or employee health care benefits, thedesign of accounting and data processing systems, and the selection of controls to safeguard assets. Still others auditclients' financial statements and inform investors and authorities that the statements have been correctly prepared andreported. These accountants are also referred to as external auditors. Public accountants, many of whom are CertifiedPublic Accountants (CPAs), generally have their own businesses or work for public accounting firms.Some public accountants specialize in forensic accounting-investigating and interpreting white-collar crimes such assecurities fraud and embezzlement, bankruptcies and contract disputes, and other complex and possibly criminal financialtransactions, including money laundering by organized criminals. Forensic accountants combine their knowledge ofaccounting and finance with law and investigative techniques to determine whether an activity is illegal. Many forensicaccountants work closely with law enforcement personnel and lawyers during investigations and often appear as expertwitnesses during trials Use the algebraic expressions for the length and width of Marlene's living room found in the23.diagram and the value of x found in Question 21C.A. Find the actual length and width of her living room.BFind the actual area of Marlene's living room. Use actual dimensions. I GIVE 24 POINTS I MARK BRAINLIEST FOR THE PERSON TO ANSWER THE QUESTION CORRECT what happens if a roller coaster was in space convert 25% into fraction with method What two things can cause a DNA helix to separate into two strandsduring PCR?