Computers and Technology

Here is my song I had you on my mind all this time. I Thought you was worth more than a dime. But I guess I was wrong. And that’s why I’m making this song. When we first met, I was doing work. Now that I know u lied to me, I feel like a jer. k. Things just running through my head. I can’t even sleep when I go to bed. I don’t know if I can get over it. When u told me its like I was hit Uh. You just make me sick. U make me feel like I’m small like a little tick. I thought you was a rea friend. I am happing we could meet face to face one day so we can shake hands. But now I’m all tied together in rubber bands. So now I feel lonely. I thought u was the one and only. But I guess not. You make me want to hit myself with a pot But its ok I just hear what u got to say

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 24.06.2019 15:30, jerry1496
If you want to delete an entire word at a time, which key should you press along with the backspace or delete key?
Answers: 1
image
Computers and Technology, 25.06.2019 02:00, whocares1819
Lisa is making a presentation for her project and she wants to use the logo of her company in her presentation. which element would she use to make her logo stand out in her presentation? a. gradation b. contrast c. alignment d. balance
Answers: 1
image
Computers and Technology, 25.06.2019 10:00, jordan84546
Which of the following methods could be considered a “best practice” in terms of informing respondents how their answers to an on-line survey about personal information will be protected? the investigator uses the informed consent process to explain how respondent data will be transmitted from the website to his encrypted database without ever recording respondents’ ip addresses, but explains that on the internet confidentiality cannot be absolutely guaranteed. respondents are informed that investigators will try to keep their participation confidential; however, confidentiality cannot be assured. the investigator uses the informed consent process to explain her institution’s method for guaranteeing absolute confidentiality of research data. respondents are informed that a research assistant will transfer all the research data to a password-protected computer that is not connected to the internet, via a usb flashdrive. the computer is located in a research team member’s office.
Answers: 2
image
Computers and Technology, 25.06.2019 13:00, canyonmorlan
Abasic wooden railway set contains the pieces shown in figure 3.the task is to connect these pieces into a railway that has no overlapping tracksand no loose ends where a train could run off onto the floor. a. suppose that the pieces fit together exactly with no slack. give aprecise formulation of the task as a search problem. b. identify a suitable search algorithm for this task and explain yourchoice. in c/c++ or python language, !
Answers: 3
Do you know the correct answer?
Here is my song I had you on my mind all this time. I Thought you was worth more than a dime. But...

Questions in other subjects:

Konu
Mathematics, 29.01.2021 01:20