1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Orlov [11]
3 years ago
11

Which of the following could be part of an algorithm?

Computers and Technology
1 answer:
stich3 [128]3 years ago
5 0

Answer:

the following what

Explanation:

there is no  work attached

You might be interested in
Name 4 components of a components system​
Veseljchak [2.6K]
The four main components are main memory, arithmetic and logic unit, control unit, and input/output (I/O). :)
4 0
3 years ago
Which of the following best explains how the Internet is a fault-tolerant system?
IrinaK [193]

Answer:

A

Explanation:

The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace.

This statement is actually the same question I had to answer when in my 2nd year 1st semester in itt.
<3 enjoy

8 0
2 years ago
Read 2 more answers
Which of the following hacker attacks against wireless networks are virtually undetectable?
Ede4ka [16]

Answer: A. passive attacks

Explanation:

Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.

A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.

Methods of carrying out passive attacks.

•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.

•Dumpster driving: Attackers or intruders search for information from discarded computers and

other gadgets, those information can help to attack a network.

7 0
4 years ago
The gene form of a trait is called a(n) ​
Rom4ik [11]

Answer:

alleles

Explanation:

7 0
3 years ago
Python code 100 Random Numbers (twice)
Leona [35]

import random

i = 1

while i <= 100:

   print("#"+str(i)+": "+str(random.randint(1,100)), end=", ")

   i+=1

print()

i = 1

while i <= 100:

   print("#"+str(i)+": "+str(random.uniform(1,100)), end=", ")

   i += 1

I hope this helps!

8 0
3 years ago
Other questions:
  • Compute the bitwise XOR between 10010100 and 11101010.
    12·1 answer
  • Which task manager tab provides details about how a program uses system resources?
    14·1 answer
  • Plz answer me will mark as brainliest picture included ​
    15·1 answer
  • Brian has been working for a few years now and has saved a substantial amount of money. He now wants to invest 50 percent of his
    12·2 answers
  • To speed up the display of graphics, a(n) ________ is integrated into some video cards. select one:
    12·1 answer
  • Which of the following is NOT one of the three main ways to control a program when writing code?
    6·2 answers
  • ANSWER ASAP!!!!!!!!!!!!!
    7·2 answers
  • Can someone please help me with this ,it is my assignment of technology and agriculture year 8
    5·1 answer
  • Type of Factor Beginning Frog Count Simulation 1 (Low) Simulation 2 (High)
    13·1 answer
  • Dragging a mouse over text is called
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!