answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rjkz [21]
2 years ago
10

ANSWER AS SOON AS POSSIBLE: When I try to join roblox adopt me it says: "Roblox Datastore servers are currently down. Please rej

oin later" what does that mean or what can I do to fix it?!?!
Computers and Technology
2 answers:
masha68 [24]2 years ago
7 0
Bro This is homework no roblox
STALIN [3.7K]2 years ago
3 0

Answer:

Troubleshooting

Explanation:

Reset Roblox by: uninstalling roblox and installing back again

Delete all roblox files in file explorer

Install again

You might be interested in
Peter accumulated many photos from his visit to Wisconsin. He wants to upload these photos to a social networking site. Which fi
daser333 [38]

Answer:

JPG / JPEG best choice and work well on websites

Explanation:

JPEGs contains millions of colors, so this type of file is ideal for photographs.

Best choice for posting on social media channels

7 0
2 years ago
Which is the term for a computer typically located in an area with limited security and loaded with software and data files that
wariber [46]

Answer:

c. honeypot

Explanation:

A honeypot is a computer or a network used to mimic the actual target of a cyberattack. It is also used to detect attacks on the network and divert them from the real network. This is used to gain insight into how cyberattacks are carried out. With such knowledge, robust security systems can be put in place.

4 0
2 years ago
Which characteristic of Cloud computing allows data centers to better manage hard drive failures and allocate computing resource
MrMuchimi

Answer:

When working with cloud computing, drive failures and need for usage and data is easily identifiable, so in short term, all of the things that show the user/s what needs to be done is the characteristic.

Explanation:

5 0
2 years ago
The Gas-N-Clean Service Station sells gasoline and has a car wash. Fees for the car wash are $1.25 with a gasoline purchase of $
beks73 [17]

Answer:

d = {"R":2.89,"P":3.09, "S":3.39, "N":0}

noofgallons = input("Enter number of Gallons:")

gastype = input("Enter Gas type/; R,P,S,N")

cwr = input("Is Car Was Requieed")

if(gastype == "R"):

   gal == nooffgallons * d['R']

   if (cwr=="y" and gal<10):

       gal+=3.00;

       elif(cwr=="y" and gal>=10):

           gal+=1.25

           elif(cwr=="n"):

               gal=gal

   elif(gastype==P):

       gal== nooffgallons * d['P']

       if(cwr="y" and gal<10):

           gal+=3.00;

           elif(cwr=="y"and gal>=10):

           gal+=1.25

           elif(cwr=="n"):

               gal=gal

       elif(gastype ==S):

           gal=noofgallons *d['S']

           if(cwr="y" and gal<10):

               gal+=3.00;

               elif(cwr=="y"and gal>=10):

                   gal+=1.25

                   elif(cwr=="n"):

                       gal=gal

                       

                       

print("tptal cost paid"+ gal)

The above program uses a dictionary for storing gasoline types and their cost, and dictionary is always constant, and hence its fulfilled the requirement of keeping it constant. And car wash is treated accordingly. And if elif else ladder has been used to calculate the total number of gallons.

Rest part is self explanatory.

Explanation:

The code is self explanatory.

7 0
2 years ago
When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
Brilliant_brown [7]

Answer:

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche or selling to government agencies.

Many such frameworks exist, and the recommendations set out in them can impose difficult and often expensive demands on enterprise resources – especially in situations where an organization is subject to a number of regulatory compliance regimes, whose requirements it has to meet while maintaining its own strong cybersecurity status.

Explanation:

4 0
2 years ago
Other questions:
  • A mouse is known as a _____ device that is able to detect motion in relation to the surface and provides an onscreen pointer rep
    6·1 answer
  • While researching ideas for cutting energy costs is his company. Hector watches an online video in which a business expert says,
    6·2 answers
  • ______ is a certification program that recognizes sustainable building practices and strategies. Question 1 options: A) Brundtla
    10·1 answer
  • You can press ____ to move the focus through the controls of the form. [page down] [tab] [f5] [f12]
    10·1 answer
  • "Suppose there is a class Alarm. Alarm has two class variables, code which contains a String value representing the code that de
    10·1 answer
  • The function below takes two arguments, a dictionary called dog_dictionary and a list of dog names (strings) adopted_dog_names.
    8·1 answer
  • Write a loop that counts the number of space characters in a string. Recall that the space character is represented as ' '.
    11·1 answer
  • Your network administrator finds a virus has been successfully inserted into the network software. The virus itself is now consi
    10·2 answers
  • (a) Show how to use (the Boolean formula satisfiability program) satisfiable num (and substitute) to find a satisfying assignmen
    9·1 answer
  • ) A byte is used to represent a single character in the computer ______<br> true or false?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!