1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kiruha [24]
2 years ago
9

[100 points] Fill in the missing word.

Computers and Technology
1 answer:
Makovka662 [10]2 years ago
6 0

answer:The cat lady has 3 left cause of the amount

Explanation:

You might be interested in
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network serv
Varvara68 [4.7K]

Answer: True

Explanation:

An hacking activity usually deal with the unauthorized access to ones system.

Similarly this technique of Drive by hacking by which the attacker release wireless networks. Then a computer user of an organization finding a wireless network tries to connect to the open network and it is this process when the computer or system user falls easy prey to the hacker. The attacker uses the wireless network as a medium to  intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

It is often accompanied with the SqL injection packets into the network.

This attack is also popular by the name hotspot attack.

5 0
3 years ago
This is not school related in anyway but. I used to play this videogame on my computer years ago, but i cannot remember the name
Taya2010 [7]
Cat Quest possibly? How long ago? i remember playing many. I LOVE CATS.
4 0
3 years ago
Read 2 more answers
Explains why we use tables in documents; and is at least three sentences long in word office 360​
Vlada [557]
Can you give a little more detail to your question
5 0
3 years ago
You type. The word "weather" when you ment "whether" when will the writer or word flag this as a misspelling or a grammar proble
xxTIMURxx [149]
Most likely depends on the situation
8 0
3 years ago
What are the types of hypervisiors ?
melomori [17]
<h2>Answer:</h2>

The correct options are

  • Bare metal and hosted
  • Memory and operating system based  Virtual and physicality
<h2>Explanation:</h2>

There are two types of hypervisors:

Type 1 hypervisor are those hypervisors that run directly on the system hardware such as a “bare metal” embedded hypervisor,

Similarly

Type 2 hypervisor is the kind of hypervisors that runs on a host operating system that provides virtualization services, such as I/O device support and memory management.


6 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is needed if a computer with the IP address 172.31.210.10/24 wants to communicate with a computer with th
    5·1 answer
  • Browsing the web is one of the most common activities performed by individuals who use computers.
    12·1 answer
  • What type of identity theft occurs when a thief spends another person's money or opens a line of credit in their name?
    8·2 answers
  • The statement ____ declares intList to be a vector and the component type to be int
    8·1 answer
  • Ergonomically designed workstations and equipment reduce stress-related injuries and improve the productivity and efficiency of
    13·2 answers
  • 2. A well designed high-volume system will minimize _________ inventory and reduce _____________for the product or service. a) w
    7·1 answer
  • Why is science, mathematics, and technology different from engineering?
    15·1 answer
  • The RGB value below produces a shade of purple. What does the number 175
    15·2 answers
  • The unit we use to measure bending moment is...<br> A kg<br> B N<br> C Nm<br> D MPa
    13·1 answer
  • Explain with examples the roles of system software and application software?<br>​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!