1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vivado [14]
1 year ago
13

How will you keep the buzz going post-hackathon?

Computers and Technology
1 answer:
Anna71 [15]1 year ago
8 0

Answer:

it would be nice if you gave some form of info here

Explanation:

in other words without information no help aka I'm slow and just need points

You might be interested in
Which type of malware can hijack internal windows components and often goes undetected because it is already loaded when the ant
Ber [7]
I believe it is referred to as 'rootkit'
5 0
3 years ago
This method of advertising is expensive but can be the most effective method.
egoroff_w [7]

<u>Answer:</u>

<em>Newspapers</em>

<u>Explanation:</u>

<em>The process of giving advertisement is one way to promote product. A product become famous only because of advertisement only. </em>

Business people spend lots of money in advertisements so that in turn it would give good returns. <em>It is not necessary that always advertisement has to be given for all the product</em>.

Mostly new products needs mobilization, next during festivals the dress <em>purchase will be heavy so people will get attracted towards it and buy in the shop which advertises, etc.</em>

8 0
3 years ago
What is the cffa act
garri49 [273]

CFAA is an acronym that stands for Computer Fraud and Abuse Act. It is an anti-hacking bill that was passed to amend an existing computer fraud law. It aims to strengthen cyber security by forbidding access to computers without authorization.

3 0
2 years ago
Read 2 more answers
What is the chief ethical concern concerning all the new sources of data available through new technological means like internet
Kryger [21]
The chief ethical concern is "Privacy". 

A negative aspect of an enormous number of sources available on internet is the concerns about privacy. Web privacy includes the privilege or command of individual protection concerning the sorting, re-purposing, arrangement to outsiders, and showing of data relating to someone through the Internet.Internet security is a subset of data privacy. Privacy concerns have been enunciated from the beginnings of substantial scale PC sharing.
6 0
3 years ago
anyone got a class named computer literacy? or sum similar to using Microsoft programs? i need a lotttt of help, im 3 units behi
seropon [69]

Answer:

I use google docs

Explanation:

I am in 6th grade but i am in expert in computers.

6 0
3 years ago
Read 2 more answers
Other questions:
  • I need to write a program that accepts eight int values representing student test scores from the user and then displays each of
    14·1 answer
  • Trading your bicycle for a snowboard exemplifies ?
    15·1 answer
  • Why is it a mistake to put e-mail address of people who don't know each other in the "to:" field
    9·2 answers
  • Which type of network topology has a central networking device which manages the network and acts as a communications conduit fo
    7·1 answer
  • Stealing passwords by using software code to run through various password schemes with numbers, symbols, capital letters, and ch
    6·1 answer
  • Dit View
    5·2 answers
  • Have y’all beat shinobi 3 return of The ninja Master for The sega genesis
    5·1 answer
  • Which of the following best describes a feedback loop?
    11·1 answer
  • I connected to an external hard drive to transfer some photos from my vacation. When I try to drag the photo, it bounces right b
    14·1 answer
  • Information Technology (IT) is a component of an Information System (IS)<br><br> True or False
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!