1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tju [1.3M]
2 years ago
12

Question # 9

Computers and Technology
1 answer:
Ganezh [65]2 years ago
8 0

Answer:

flight stimulators are used to train astronaut and design simple air craft

You might be interested in
Tahir is setting up a message option before sending an e-mail to a colleague. He goes into the Properties dialog box and chooses
Fed [463]

The answer is Sensitivity

Tahir can restrict actions a recipient can take on the messages he sends. It is recommended that you use IRM (Information Rights Management) if available. Choosing the private option will restrict the recipient from taking actions such as forwarding a confidential message to another person. When Tahir selects the private option, the recipient of the message will see a “please treat this as private” in the information bar.

3 0
4 years ago
A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrato
elena-s [515]

Answer: Session Hijacking

Explanation:Session hijacking is the attacking activity that threats the valid session of the computer. This attack also invokes the system with unauthorized access for hacking the information and other processes.

Other options are incorrect because crpto-malware is the ransomware that demands ransom for data encrypted by the hackers, rootkit  permits the authorized access in system without getting noticed and logic bomb is a malicious code to harm the program computing. Thus, the correct option is session hijacking.

8 0
3 years ago
After creating an organizational strategy based on porter's models, a company can?
malfutka [58]
1.B 2.B 3.C 4.B 5.B 6.C 7.A 8.A 9.C 10.A
3 0
3 years ago
Read 2 more answers
Identify the function for the following computer part: Printer Question 23 options: Input
Anastasy [175]
24 is processing because it process info 
5 0
4 years ago
A computer program that translates one program instructions at a time into machine language is called a/an
zhuklara [117]
Compiler because there are multipule compilers like cobalt that are made gor that  <span />
6 0
3 years ago
Read 2 more answers
Other questions:
  • Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1
    5·1 answer
  • What’s of the following can be used to visually represent information similar to diagrams format painter Helens smart are a clip
    8·1 answer
  • Discuss how advertising on the Web affects search results and the ethical dilemmas associated with it.
    5·1 answer
  • You work part time at a computer repair store. You are in the process of building a new computer system. The customer wants a mo
    6·1 answer
  • A supermarket chain wants you to implement an in-memory database that can be used to access facts about the products they sell.
    12·1 answer
  • Puter Science (IS)
    14·1 answer
  • So whenever I play among us, I always get killed. Like always. I want to know some Technics to being a crew mate and an impostor
    9·1 answer
  • It is important to understand the different types of DoS attacks and the symptoms of those attacks. Leaving a connection half op
    15·1 answer
  • How are the functions different and how do i determine the answer
    5·1 answer
  • which dual-stack architecture allows ipv4 and ipv6 at the network layer to access a single tcp/udp stack
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!