1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
avanturin [10]
2 years ago
13

Hellpppppppppppppppp

Computers and Technology
2 answers:
mylen [45]2 years ago
8 0
What’s the issue? I don’t get it
jonny [76]2 years ago
6 0

Answer:

i can't see your problem

You might be interested in
The likelihood of the occurrence of a vulnerability multiplied by the value of the information asset - the percentage of risk mi
iogann1982 [59]

Answer:

A. Risk assessment estimate factors.

5 0
3 years ago
. What physical characteristic does a retinal scan biometric device measure?
elena-s [515]

Answer: D)The pattern of blood vessels at the back of the eye.

Explanation: The retinal scan is the techniques which is used in the bio-metric mechanism.The scanning of the retina's blood vessel pattern is capture by the scanner is the unique technique which is used for bio-metric purpose.

Blood vessel pattern is capture because it is present in unique form for every person and will help in distinguishing a person from another person while scanning.

Other options are incorrect because light reflection or reaching near retina and light pattern are not the unique way for identification while scanning a person.Thus the correct option is option(D).

4 0
3 years ago
In this problem, we explore some of the properties of the CRC. For the generator G (=1001) given in Section 5.2.3, answer the fo
allochka39001 [22]

Answer:

b

Explanation:

5 0
3 years ago
True or False: F Layout is better for users who read left to right, but layout is better for users who read right to left.
ipn [44]

Answer:

false

Explanation:

it depends on the user

5 0
2 years ago
Ill give brainliest if possible
AlekseyPX
I can’t see that zoom it in
8 0
3 years ago
Read 2 more answers
Other questions:
  • What does iSCSI stand for?
    5·2 answers
  • which of the following are used on cable trays to protect the cable insulation from direct sunlight? a. barrier strips b. solid
    5·1 answer
  • Refer to the exhibit. A web designer calls to report that the web server web-s1.cisco is not reachable through a web browser. Th
    15·1 answer
  • Clep allows students to do all of thw following except which?
    11·2 answers
  • Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data
    13·1 answer
  • How would you define the rule of thirds?
    11·1 answer
  • What's the difference between cross-site scripting and cross-site request forgery? How do you protect against cross-site request
    15·1 answer
  • What is computer software​
    9·1 answer
  • true Or False 1. Computer Time is located in Start Menu, b. Ms Word is developed by Adobe Corporation c. Ms-Excel is Presentatio
    9·1 answer
  • What happens on your screen when you click on the eyedropper tool in Scratch? The background of your scene will become transpare
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!