Explanation:
Lyrics
It's raining tacos
From out of the sky
Tacos
No need to ask why
Just open your mouth and close your eyes
It's raining tacos
It's raining tacos
Out in the street
Tacos
All you can eat
Lettuce and shells
Cheese and meat
It's raining tacos
Yum, yum, yum, yum, yumidy yum
It's like a dream
Yum, yum, yum, yum, yumidy yum
Bring your sour cream
Shell
Meat
Lettuce
Cheese
Shell
Meat
Lettuce
Cheese
Shell
Meat
Cheese, cheese, cheese, cheese, cheese
It's raining tacos
Raining tacos
Raining tacos
It's raining tacos
It's raining tacos
Raining tacos
Raining tacos
Shells, meat, lettuce, cheese
It's raining tacos
It's raining tacos
Answer:
Explanation:
is that even a real song??
btw i answered so the other guy can get brainlest annnnnnd bc i want the point LOL
what is the best to deal the most hearts in mine craft
Answer:
what does this mean
Explanation:
oh nvm I get it but it depends what you play on if you play on console or phone its a fully enchanted nephrite sword but on a computer is a fully en chanted axe you can see the order to enchant so you don't mess it up
HELPPP ME PLEASEEE!!
Identify the characteristics of syntax errors. Choose all that apply.
programmer did not follow the program language conventions
may be highlighted while writing the program
can be caused by mistyping or misspelling while writing the program
does not cause an error message
Answer:
Explanation:
Identify the characteristics of syntax errors. Choose all that apply.
programmer did not follow the program language conventions
may be highlighted while writing the program
can be caused by mistyping or misspelling while writing the program
Answer:
Its A B C i got it right
Explanation:
Which of the following images illustrates safe driving?
Answer:
bottom left
Explanation:
Answer:
keep your eyes on the road!!!!
A chain of coffee servers is sending a spreadsheet of projected costs and profits to some of its investors. When, Kyle, the administrator making the spreadsheet, adds an image of his company’s logo, he realizes it would fit and look best if turned to read sideways.
How can Kyle change the image to make it fit in such a way?
He can select the image and hold down on the green handle above it while sliding the mouse.
He can select the image and hold down Control while sliding the scroll bar to the right.
He can press the PivotTable button and select “Rotate 90 degrees” and then click OK.
He can click on the Pictures Tool tab and select press Artistic Effects to access the rotate option
Answer:
On a spreadsheet application including MS Excel;
He can select the image and hold down the rotation handle above it while sliding the mouse
Explanation:
Manual rotation of a picture or a text box can be performed by selecting the image or text box in MS Word or a spreadsheet application such as MS Excel. With the mouse select the rotation handle of the picture and drag in the direction desired, left or right.
So as to limit the rotation to 15 degrees hold down the shift button while dragging the rotation handle by clicking on it with a mouse and dragging in the desired direction
i really want to know the best way to deal as much heart as possible plz tell me
Answer:
Set aside time every day for doing something that feels positive, whether that’s journaling, meeting up with a close friend, or watching a show that makes you laugh. Scheduling in moments that bring you joy is vital for healing a broken heart. It’s important to talk about your feelings with others and not numb yourself out.
Explanation:
Stages of reverse engineering
Answer:
Capture Data, Refine the Model, and then Manufacture it.
Explanation:
What are good components to preorder a PC with that are cheep? It would be my first PC by the way.
Answer:
Good Components
.CPU AMD Threadripper 3960X Amazon
.CPU cooler NZXT Kraken X63 (280mm AIO liquid cooler) Overclockers
.GPU Zotac Gaming GeForce GTX 1660 6GB CCLonline
.Memory 32GB Corsair Dominator Platinum RGB 3200MHz Scan
Explanation:
How do we know if we can believe the things on the internet?
Answer:
you have to check for reliability
Explanation:
Answer:
you can't always believe the internet some stuff is false are bended
Explanation:
yea
the advantages and disadvantages of internet
Choose the expression that belongs in the blank in order to have the output shown.
>>> a = 5
>>> print(_____)
The value is5
"The value is " + str(a)
"The value is" , str(a)
"The value is " , str(a)
"The value is" + str(a)
Answer:
Option B
Explanation:
Given
a = 5
and if the value allotted to variable a is to be printed, the following command will be used
print "The values is", str(a)
Hence, option B is correct
adassadad saflalfaklfajfklajfalkfjalkfjalkfalkf
Answer:
this belongs on r/ihadastroke
Explanation:
Answer: ok
Explanation:
write examples of hacking in internet?
Answer:
Although hacking is very bad, it can be found everywhere and anywhere.
Examples: Phishing, password checking, and keyloggers
Explanation:
Explanation:
Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.
To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.
(50 POINTS) A folder has been shared with other users and set to read-only. What does this mean for users?
Users can only read the name of the shared folder.
Users cannot add new folders or files.
Users can read and edit files.
Users can add new files but not new folders.
Answer:
B
Explanation:
Fatima has 3 packs of batteries. Each pack contains 4 batteries. She gives her brother 8 batteries to put in his toy robot. Let b represent the number of batteries Fatima has left. Which equation could be used to find the value of b?
Answer: See explanation
Explanation:
Let b represent the number of batteries Fatima has left.
The equation that can be used to find the value of b goes thus:
(3 × 4) = b + 8
12 = b + 8
b = 12 - 8
Therefore, based on the above equation, the number of batteries that Fatima has left will be 4.
Select the correct answer from each drop-down menu.
Complete the following sentences.
_________ effort is an important and necessary factor for the success of any project. In software development projects,
_______team members carry out several tasks to ensure the quality of the process and the final product.
Options for the first box are: managers, A teams, an individuals
Options for the second box are:internal, specific, external
Answer:
First, A teams, Second ,Specific
Explanation:
BRAINLIEST 14 points
The Great Firewall of China _____. Select 4 options.
blocks websites
filters all emails
filters social media
filters web searches
jams signals
Answer:
the first four options
Explanation:
they make the most sense
The Great Firewall of China is designed and developed to:
Block websites.Filter all emails.Filter social media.Filter web searches.What is the Great Firewall of China?The Great Firewall of China can be defined as a set of legislation and network security protocol that domestically monitors, regulates and controls inbound and outbound Internet traffic in the People's Republic of China, based on set aside security rules.
In this context, the Great Firewall of China is designed and developed to domestically:
Block websites.Filter all emails.Filter social media.Filter web searches.Read more on Great Firewall of China here: https://brainly.com/question/27411286
#SPJ2
45 points
Multiple Choice: Choose the answer that best fits each statement below.
______ 5. Which of the following can be found by clicking the AutoSum drop‐down?
a. Average
b. Min
c. Sum
d. All of the above
______ 6. Which option is used to prevent a cell reference from changing when a formula is copied to
another location?
a. Named ranges
b. Absolute cell reference
______ 7. An advantage to defining range names is:
a. Selections can be larger
b. Selections can be any format
c. Name ranges are easy to remember
d. Name ranges clear cell contents
True/False: Answer True or False for each statement below.
______ 8. You can only increase or decrease the decimal places by two.
______ 9. The comma style allows you to format with a thousands separator.
______ 10. Excel does not allow you to copy and paste formulas with AutoFill.
Answer:
5 its either a or b and 6 is b 7 is d and 8 t 9 f 10 f
Explanat ion:
You have created a group policy that prevents users in the accounting department from accessing records in a database that has confidential information. The group policy is configured to disable the search function for all users in the Accounting OU no matter which workstation is being used. After you configure and test the policy, you learn that several people in the Accounting OU have valid reasons for using the search function. These users are part of a security group named Managers. What can you do to prevent the Group Policy object (GPO) that you have configured from applying to members of the Managers group
Answer: Add the Managers group to the GPO's discretionary access control list (DACL).
Deny the apply Group Policy and read permissions to the Managers group.
Explanation:
To prevent the Group Policy object (GPO) which had been configured from applying to the members of the Managers group, the Managers group should be added to the GPO's discretionary access control list (DACL).
Likewise, the apply Group Policy can be denied and read permissions to the Managers group. This will further help in the prevention of users.
(WEB DESIGN FINAL QUESTION) PLEASE HELP
what is a trademark?
Answer:
a trade mark is something where someone owns the rights to something in a specific country
You are working on a ticketing system. A ticket costs $10. The office is running a discount campaign: each group of 5 people is getting a discount, which is determined by the age of the youngest person in the group. You need to create a program that takes the ages of all 5 people as input and outputs the total price of the tickets. Sample input: 55 28 15 38 63 sample output: 42.5 the youngest age is 15, so the group gets a 15% discount from the total price, which is $50 - 15% = $42.5
Answer:
Explanation:
The following program is written in Java. It takes 5 inputs of int values for the ages of each member in the group. Then it loops through all of the ages and chooses the youngest age. Finally, it applies that age as a discount to the final price which would be $50, outputting the final discounted price. The output for the test case provided can be seen in the attached picture below in red.
import java.util.Scanner;
class Brainly
{
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
int[] person = new int[5];
System.out.println("Enter age of individual 1: ");
person[0] = in.nextInt();
System.out.println("Enter age of individual 2: ");
person[1] = in.nextInt();
System.out.println("Enter age of individual 3: ");
person[2] = in.nextInt();
System.out.println("Enter age of individual 4: ");
person[3] = in.nextInt();
System.out.println("Enter age of individual 5: ");
person[4] = in.nextInt();
int youngest = person[0];
for (int x = 0; x < person.length; x++) {
if (person[x] < youngest) {
youngest = person[x];
}
}
double discount = 1 - (((double)youngest) / 100);
double output = 50 * discount;
System.out.println("Total Price: " + output + " the youngest is " + youngest);
}
}
She goes to look at her
HTML code to see what is wrong line by line until she can figure out what she
messed up. Which process is Ana using?
A. Fragmentation
B. Identification
C. Pinpoint
D. Debugging
The process is Ana using is Debugging. Check below to see what the term is all about.
What is debugging used for?Debugging is known to be the act of working on how a given program runs, and also how it creates data so as to be able to defects and know issues in a given code.
Note that since she goes to look at her HTML code to see what is wrong line by line until she can figure out what she messed up, she is engaged in debugging.
Learn more about Debugging from
https://brainly.com/question/163290
#SPJ2
Need the answer ASAP!!!!
Select the correct answer.
Which software development team member would make the most use of the tool, Load Runner?
O A.
software engineer
OB.
programmer
OC.
business analyst
OD.
tester
Answer:
software engineer is the answer
HELPPPP KOKICHI IS OUT TO KILL ME
Answer:
rest in piece :(
Explanation:
Ishmael would like to capture a selected potion of his screen and then capture action he performs on that selected portion. What should he do?
Use a video from my PC command
User the insert screen recording control
Create a poster frame
Use an embed code
Answer: User the insert screen recording control
Explanation:
Since Ishmael wants to capture a selected potion of his screen l, after which he'll then capture the action that he performs on that selected portion, he should use the insert screen recording control.
It should be noted that on most keyboards, there's an "insert screen" button. Also, Ishmael can simply open the window that he wants to screenshot and then click the screenshot button.
Therefore, the correct option is B.
write HTML code to create a web page which will contain a title my favourite book as a centralised heading feluda somogro and body will contain the name of the author satyajit ray
Answer:
Satyajit Ray (1921–1992), a Bengali film director from India, is well known for his contributions to Bengali literature. He created two of the most famous characters in Feluda the sleuth, and Professor Shonku the scientist. He wrote several short novels and stories in addition to those based on these two characters. His fiction was targeted mainly at younger readers (mostly teenagers) , though it became popular among children and adults alike.

Ray during recording of his film Pather Panchali
Most of his novels and stories in Bengali have been published by Ananda Publishers, Kolkata; and most of his screenplays have been published in Bengali in the literary journal Ekshan, edited by his close friend Nirmalya Acharya. During the mid-1990s, Ray's film essays and an anthology of short stories were also published in the West. Many of the stories have been translated into English and published.
Suggest three ways in which celebrating an occasion influences food choices?
Answer:
It can completely show the different flavors that might have influenced the people at the past like their traditional spices and their main ingredients. It also is just a big part of celebrations because usually every single celebration comes with food and drinks.
What is the web page path on the web server for the URL:
http://www.mydomain.com/main/index.html?
O http://
O www.mydomain
O main/index.html
O index.html
Answer:
C: main/index.html
Explanation:
select the correct answer
What is SQL used for?
A. to write machine language code
B. to design webpages
C. to extract information from databases
D. to convert machine language into a high-level language
The SQL used to extract information from databases. (Choice: C)
Functions of SQL languageIn this question we must understand about computer languages to answer correctly.
SQL stands for Structured Query Language and is a specific domain language intended for the management and retrieve of relational databases. Thus, SQL is used to extract information from databases.
Thus, SQL is used to extract information from databases. (Choice: C) [tex]\blacksquare[/tex]
To learn more on databases, we kindly invite to check this verified question: https://brainly.com/question/6447559
Answer:
The correct answer is C. To extract information from databases.
Explanation:
I got it right on Edmentum.
Complete the sentence.
You might create algorithms and flowcharts during the ______ phase of software development.
Release
Planning
Design
Coding
You might create algorithms and flowcharts during the Design phase of software development.
What is the algorithms about?In software development, the Design phase is a crucial step in which the developers plan and determine how the software will be built. This involves breaking down the requirements and specifications into smaller, manageable components and then figuring out how these components will work together.
Therefore, to accomplish this, developers often create diagrams, such as flowcharts or algorithms, to help visualize the software's logic and structure. These diagrams can then be used to guide the development of the software, ensuring that all parts of the project are aligned and working towards the same goals.
Learn more about algorithms from
https://brainly.com/question/20543449
#SPJ1