WILL GIVE A BRAINLIEST!!! PLS HELP!!!






We're no strangers to love
You know the rules and so do I
A full commitment's what I'm thinking of
You wouldn't get this from any other guy
I just wanna tell you how I'm feeling
Gotta make you understand
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

WILL GIVE A BRAINLIEST!!! PLS HELP!!! We're No Strangers To LoveYou Know The Rules And So Do IA Full

Answers

Answer 1

Answer:

Never gonna give you up

Never gonna let you down

Never gonna run around and desert you

Never gonna make you cry

Never gonna say goodbye

Never gonna tell a lie and hurt you

Never gonna give, never gonna give

(Give you up)

We've known each other for so long

Your heart's been aching but you're too shy to say it

Inside we both know what's been going on

We know the game and we're gonna play it

I just wanna tell you how I'm feeling

Gotta make you understand

Never gonna give you up

Never gonna let you down

Never gonna run around and desert you

Never gonna make you cry

Never gonna say goodbye

Never gonna tell a lie and hurt you

Never gonna give you up

Never gonna let you down

Never gonna run around and desert you

Never gonna make you cry

Never gonna say goodbye

Never gonna tell a lie and hurt you

Never gonna give you up

Never gonna let you down

Never gonna run around and desert you

Never gonna make you cry

Never gonna say goodbye


Related Questions

7.4 Lesson Practice (projectstem): what is output if the user is enters 2?​

Answers

Answer:

18

Explanation:

lets go step by step.

the function called tryIt has a value, a variable named "a". this "a" variable will be whatever the user enters when the program says, Enter a number.

ok so if we enter "a" as 2, and b in the function will always be 7, and 2 + 7 equals 9,

and the ans variable (short for answer) will take the result of the function (9) and multiply it by 2,

then the answer is 18

What is the smallest unit of data in a computer? *
a) byte
b) terabyte
c) bit
d) bistable device

Answers

the smallest unit of data in a computer is bit

To delete a database object, press and hold or right-click the object in the Navigation Pane and then tap or click ____ on the shortcut menu.

Answers

Answer:To delete a database object, press and hold or right-click the object in the Navigation Pane and then tap or click Delete on the shortcut menu.

Explanation:

Hope I could help. Have a nice time there.

what is not an example of a changing operating space?

Answers

What is not an example of a changing operating space? A parking garage. Riley is driving down the highway when the road starts curving to the right.

Parking in garage is not an example of a changing operating space.

What is operating space?

When an operating space is said to be "changing," it usually means that the environment around your car is deteriorating or switching from an open to a closed state.

Operational Spaces are the space(s) inside the Facilities from which the Concessionaire shall have the right, privilege, and obligation to continuously and for the duration of the Term operate its concession in accordance with the terms and conditions of this Agreement.

Distractions while driving, such as texting and using a phone, driving dangerously, such as going too fast or following too closely.

Driving when intoxicated. While drinking and driving is not especially high among novices, it produces a disproportionate number of fatal crashes.

Thus, parking garage is the answer.

For more details regarding operating space, visit:

https://brainly.com/question/9339555

#SPJ6

List down 5 elements of Multimedia

Answers

Answer:

text, image, audio, video, animation

Answer : The five elements of Multimedia are text, images, audio, video and animation.

Hope This Helps You.

A ______________ utility provides an overview of your files and lets you rename, delete, move, and copy files and folders.

Answers

Answer:

File Management Utility

Explanation:

File Management Utility is a computer software that help to browse, search, arrange, find information, and quickly preview the files of the system.

Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).

Answers

Sandbox. ... Real-time strategy (RTS) ... Shooter (FPS and TPS) ... Multiplayer online battle arena (MOBA) ... Role-playing games (RPG, ARPG, and more) ... Simulation and sports.

- BRAINLIEST answerer

Lol yeah I agree w the person above, I don’t wanna copy

what are the different forms of auto form?​

Answers

Answer:

There are two types of AutoForm—the New Object: AutoForm and the builder-based AutoForm. The New Object: AutoForm generates a very simple and uninspiring data entry form. The builder-based AutoForm creates five different types of forms: Columnar, Tabular, Datasheet, PivotTable, and PivotChart.

What are some ethical issues related to data mining? In other words, what are some ways that companies may gather or use data that are not appropriate?

Answers

Data mining is not an easy task, as the algorithms used can get very complex and data is not always available at one place. It needs to be integrated from various heterogeneous data sources. These factors also create some issues. Here in this tutorial, we will discuss the major issues regarding −
Mining Methodology and User Interaction
Performance Issues
Diverse Data Types Issues

In Linux, most applications and commands are in the ____ directory or its subdirectories bin and sbin.

Answers

On a Linux computer, most of the software applications are saved in the /usr directory or in its subdirectories named, bin and sbin.

A Linux can be defined as an open-source and community-developed operating system (OS) that is designed and developed for the following electronic devices:

Mainframes. Computers.Embedded systems.Mobile devices.

Generally, the Linux operating system (OS) is based on UNIX and it is typically released under the GNU general public license (GPL).

On a Linux computer, the commonly used directory for saving most software applications is the /usr directory or sometimes its subdirectories named, bin and sbin.

Read more: https://brainly.com/question/20629962

________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.

Answers

Answer:

Social engineering is a process of manipulating people into breaking normal security procedures or divulging confidential information.

Explanation:

If you want to excel in the field of web design, what must you be able to make and keep?
price estimates
statement of work
final deadlines
promises

Answers

Answer:

You  need to beable to make final deadlines because maybe if your adding divs or maybe something takes a bit long for you to do you need to give the person your working for an idea of what and why you may take long to get your website polished.

Explanation:

Answer:

B. final deadlines

Explanation:

edg 2021 (got 100%)

Which invention provided instant communication and information to a massive audience for the first time? a. Intranet c. Video b. Television d. Internet Please select the best answer from the choices provided A B C D.

Answers

Answer:

B. television

Explanation:

Answer:bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb

Explanation:

Anote los tipos de direcciones de IP que existen.​

Answers

Answer:

ENGLISH PLEASE.

Explanation:

The type value ____ for the input element may cause modern browsers to validate entries to ensure that they are valid web addresses.

Answers

Answer:

url

Explanation:

Electronic evidence on computer storage media that is not visible to the average user is called​ ________.

Answers

Answer:

Electronic evidence on computer storage media that is not visible to the average user is called​ ambient data.

According to the C&M Technology Competitor View, while Accenture leads in Consulting and SI, which are our two major competitors in large deals?

Answers

Even though Accenture leads in Consulting and SI, its major competitors include McKinsey and Bain & Co. Inc.

Accenture is a multinational professional technology service company that provides digital, tactical, strategic, and consulting services for its clients.

Accenture was formerly known as Arthur Anderson LLP. It's regarded as one of the top accounting firms in the world. Some of its major competitors in large deals include McKinsey, Bain & Co. Inc., Boston Consulting Group, Inc.

Read related link on:

https://brainly.com/question/25740331

What contribution did ada byron make to computing?

Answers

Answer:

Around 1843, she described the first computer principles, later built by Charles Babbage in the form of a mechanical calculator.

Ada Byron was a writer and mathematician known for her work on Babbage's early mechanical general-purpose computer. She helped to write the first algorithm intended to be processed by a machine.

Coordination in a global information system requires a _____ architecture for data, standardization within departments.

Answers

Coordination in a global information system requires a decentralized architecture for data, standardization within departments

how do you play pokemon go

Answers

Download the app and make an account hope this helps!

Answer:

download the app then tap your screen for the rest of your life

(And I'm being serious)

using numerous computers to inundate and overwhelm the network from numerous launch points is called

Answers

Using numerous computers to inundate and overwhelm the network from numerous launch points is called: a DDos attack

Time shifting occurs when _______. A. Clocks move ahead one hour in the spring b. Works are copied and kept for future generations c. Individuals copy works to view at a later time d. Copyrighted materials comes into the public domain.

Answers

Answer:

c. Individuals copy works to view at a later time

Explanation:

Time Shifting: Recording a program to a storage medium to be consumed at a later date.

Time shifting occurs when Individuals copy works to view at a later time. The correct option is c.

What is time shifting?

As the name implies, time shifting is the shifting of a signal in time. This is accomplished by adding or subtracting a shift quantity from the time variable in the function.

Time shifting or Shifting a signal in time means that the signal is either delayed or advanced in the time axis.

Other space shifting processes include time shifting, which involves recording a radio broadcast and listening to it later, and format shifting, which involves converting a media file into a different format.

You can watch a show at separate moments of the day by changing the time. When people copy works to view later, they are time shifting.

Thus, the correct option is c.

For more details regarding time shifting, visit:

https://brainly.com/question/11563105

#SPJ5

PLEASE HELP! WILL MARK AS BRAINLIEST JavaScript can be implemented using the _________ HTML tags in a web page.​

Answers

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the ...  HTML tag

Explanation:

The USGS and National Weather Service have many sensors collecting data about natural events.

That data can be used to create a weather map.

Identify the parts of the Input-Process-Output model for each step.


(output, input, process): weather map displayed on a web page


(output, input, process): determination of color to be used on the map


(output, input, process): sensors collect temperature and precipitation data

Answers

Answer:

Explanation:

Throughout many regions on the chart, a standard plotting code demonstrates air currents speed and direction, average temperature and relative humidity, barometric pressure and its change over the previous hours, the number and variety of clouds, the weather type, including visibility restrictions, and the amount and type of precipitation.

USGS and National Weather Service

As per the question, the USGS  and National weather services are mapping out the region to collect the data for the natural events. The data is collected in the form of maps and is used for the identification of the input and the output model steps.

The answer is precipitation data, visibility data.

The NWS is a federal agency of the united stated that is tasked to prove the forecasts and for the formation of hazardous weather events and warns the public of the related events.

Learn more about the National Weather Service

brainly.com/question/17774978.

In the 1990s, DVDs replaced audiocassettes and floppy disks as the storage media of choice for music and computers. At which stage of the product life cycle is the DVD today

Answers

Answer:

Maturity

Explanation:

What is a megavirus in computing

Answers

In the lab experiments conducted by Professor Claverie and colleagues, in which they infected fresh-water amoebas, Megavirus was seen to construct large trojan organelles - the "cells within cells" that would produce new viruses to infect other amoebas.

Raina remembered when she taught Amara to draw. What happened?

Answers

Sisters is an autobiographical graphic novel written by Raina Telgemeier as a follow-up to her earlier graphic memoir Smile. It details a long summer road trip taken from San Francisco to Colorado by her family and explores the relationship between Raina and her younger sister, Amara.

- BRAINLIEST answerer

SOMEONE WHO ACTUALLY KNOW HOW TO DO THIS PLEASE DO IT AND SEND A SCREENSHOT I REALLY NEED IT FOR MY EXAMS AND DONT TROLL ​

Answers

What computer do you own?

help me i'll brainiest if its right

Answers

Answer:

Your response is correct.

I hope this helped at all.

Answer:A

Explanation: by limiting the amount of thermal energy that flows  out of the drink keeps it nice and taste :D

Memory of your familiar old e-mail password may block the recall of your new password. This illustrates

Answers

Answer:

Retroactive Interference

Explanation:

Memory of your familiar old e-mail password may block the recall of your new password, This illustrates a phenomenon known as proactive interference.

Proactive interference occurs when previously learned information interferes with the recall or retrieval of new information.

The memory of the familiar old e-mail password is interfering with the recall of the new password.

The interference happens because the old password is already deeply ingrained in the individual's memory, and when trying to recall the new password, the old password comes to mind automatically and hinders the retrieval of the correct information.

This interference can lead to forgetting or temporarily blocking the recall of the new password.

To learn more on Proactive interference click:

https://brainly.com/question/30320488

#SPJ6

Other Questions
Explica cada un de los deberes ciudadanos Write in point slope form the equation for the line that goes through the point (-1,-6) and has a slope of 16 Apprenticeships are a form of job training in which a sponsor, such as an employer, paysa trainee to learn and work in a particular occupation. Some jobs in the military includeapprenticeship training, but others involve different types of hands-on learning.True or False _____ refers to a policy that punishes another country for an action or perceived action. What should the writer do to correctly punctuate this sentence?At the top of the mountain, the landscape spread out before them it wasabsolutely glorious.O A. Add a colon after "them."B. Add a colon after "out."O C. Add a semicolon after "out."O D. Add a semicolon after "them." Apologize If i keep spamming this question, I just really need help fundamental similarity due to descent from a common ancestor is called Crafts Unlimited sells ribbon by the foot. Serena needs ribbonfor an art project. The cost of the ribbon is 5 feet for $3.00.Feet of Ribbon 1 5 10 15Cost (in dollars) $3.00a. Complete this ratio chart based on the information provided.b. How many feet of ribbon can Serena buy for $12.00?c. If Serena needs 17 feet of ribbon, how much will she pay?How do you know? plz help its so confusing Match these items. Match the items in the left column to the items in the right column. 1 . gravitational force the physical law nicknamed "action-reaction" 2 . Newton's First Law the physical law that states that planetary orbits are ellipses 3 . Copernican system described as a field 4 . Kepler's First Law the model of a planetary system that has the earth at the center 5 . Kepler's Second Law an example of a heliocentric system 6 . centripetal force the physical law that states that R3\T2 = K for a system 7 . Kepler's Third Law a spacecraft cruising at v = constant with its rockets shut down 8 . geocentric system the physical law that relates acceleration to net force 9 . Newton's Third Law gravitational force that keeps planets in orbit 10 . Newton's Second Law the physical law that states that equal areas are swept out in equal times Compare the fractions using the LCM.1\7,2\3Enter the correct inequality in the box. Why did Antoine Lavoisier reject the phlogiston theory? What is the modern-day theory that itcontradicted? How are you right now:)I want to hug you so tight Suppose rashon wants to find out about how world war 1 affected the United States. Rashon what find out the most information How did the attempt of the increases of justices on the us Supreme Court impact the relationship between the three branches of government? if f(x)=4x+3 and g(x)=x^2-3 what is f(g(4)) who gave many speeches to convince delegates to sign the declaration of independence? All the dimensions of a cuboid are whole numbers, and its volume is 24 units^3. Which one of the following could NOT be one of its dimensions?A.) 3B.) 4C.) 5D.) 6First Person who gets it right and EXPLAINS will get branliest! :-) Which answer best explains how the Articles of Confederation addressed the question of creating a court system? The Articles established the trial-by-jury system for the first time in history. The Articles created state, regional, and national courts throughout the land. The Articles took control of the court system and appointed judges for life-time terms. The Articles did not establish a national court system, and courts stayed under the control of the states. Each side of an equilateral triangle has length x+3 and each side of a square has length 4x-2. Write an expression for the sum of their perimeters.Please help me!!