1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anvisha [2.4K]
3 years ago
7

What is the red wavy underline beneath the text

Computers and Technology
1 answer:
8_murik_8 [283]3 years ago
7 0
It means that you spelled the word wrong, if you click on it you might be able to find the right way to spell it

You might be interested in
Linguist study
alexandr402 [8]
D).

Linguist is the study all about a language spoken written and the modern ways of using it via slang etc.
8 0
3 years ago
Which of the following is important to do when downloading a game to your
Anestetic [448]

Answer: (A) Check the vendors website to see if your model of phone and OS are listed as  supporting this game

Explanation:

  When we downloading a game in our smartphones we should check the vendor website that whether the phone model and the operating system supported the game. The smartphone is the type of the cellular telephone that contain integrated computer.

So, different types of smartphones model contain different types of operating system support. For example, the apple is the only type of vendor which build its own type of operating system and iPhone.

Therefore, Option (A) is correct.

3 0
2 years ago
Consider a system that uses a 32-bit unique salt where users have a 4-digit number as a password (e.g. 6813). Eve wants to crack
Alenkasestr [34]

Answer:

18000 seconds or 300 minutes.

Explanation:

In the example given in the question, it is stated that the system uses 32-bit unique salt which is equal to 4 bytes where every digit takes up 1 byte thus forming the 4 digit passwords.

Considering that the passwords are 4 digits, starting from 1000 and up to 9999, there are 9000 possible password combinations.

If Eve has to go through the whole range of possible password combinations and it takes her 1 second to guess 1 password. Then in the worst case scenario, it would take her 18000 seconds or 300 minutes to crack both accounts, assuming that it is possible for them to use the same passwords.

I hope this answer helps.

6 0
3 years ago
Read 2 more answers
2. The On and Off states are represented by _____________ class 7 number system​
Artist 52 [7]

Answer:

Binary maybe, I think so

4 0
2 years ago
Read 2 more answers
Which of the following sets of acronyms is concerned with encoding data for secure transmission?
guapka [62]

I'm pretty sure your answer is VPN. Hope this helps!

7 0
2 years ago
Other questions:
  • Name the component used in first generation of computer​
    10·1 answer
  • What is the decimal equivalent of the binary number 1102?
    8·2 answers
  • How can a network design project benefit from the principles of itsm? How might itsm impede a network design project?
    11·1 answer
  • If your laptop is not able to connect to your wireless network, which of the following might be a likely cause of the problem?
    11·2 answers
  • Which of these sites would need additional investigation to check for reliability?
    8·2 answers
  • Which of the following works on the pay-per-click (PPC) and cost-per-click (CPC) concept? ~ Plato
    9·1 answer
  • If a file you are opening for appending does not exist, the operating system will detect the missing file and terminate the oper
    14·1 answer
  • Which one you choosing? PS5 OR THE XBOX SERIES X???
    14·2 answers
  • What is Japanese tradition?
    8·2 answers
  • _______ is a medium-range wireless network. ________ is a medium-range wireless network. Cellular radio LTE UWB Wi-Fi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!