1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kiruha [24]
1 year ago
12

Attackers will sometimes put malware on USB drives and leave them in parking lots

Computers and Technology
1 answer:
kherson [118]1 year ago
6 0

Answer:

True

Explanation:

a lot of people use this as a way to keep things nice and safe, but sometimes thinks don’t go as planned. Don’t really know how else to answer this lol

You might be interested in
What is the windows server 2012 r2 feature that enables you to maintain previous versions of files on a server, so that if users
just olya [345]
Idk bro google it because that happen to me to and idk wat to doo dawg
7 0
3 years ago
If we want to access files located in a directory on a remote server, which of these options would we use?
Ray Of Light [21]
DNS obviously...............
5 0
3 years ago
Read 2 more answers
Positive use of the technology before the pandemic.
Nana76 [90]

Answer:

Positive use of the technology before the pandemic. Is to talk to relatives who live far away. Find a Cool Recipe and to be nice online.

Explanation:

4 0
3 years ago
If you were doing a regular expression inside a Linux command line, which special character on the keyboard would give you two p
Murrr4er [49]

Answer: car | truck

Explanation: The pipe (|) symbol used can be used in regular expression to simply imply OR. This means when used in between expression, can be used to search for all matches of the strings in which it stands in between. In the scenario above, If the pipe symbol is located in between the two strings, such as [ cars | trucks], the expression returns possible occurrence of the strings cars and trucks. It may also be used to locate and return the occurrences of more than 2 strings, such as; string1 | string2 | string3

6 0
3 years ago
Dana downloads music into her computers random access memory, or ram, without authorization. this is?
lilavasa [31]
This is copyright infringement.
7 0
3 years ago
Other questions:
  • An automobile battery, when connected to a car radio, provides 12.5 V to the radio. When connected to a set of headlights, it pr
    11·1 answer
  • What is the IEEE standard for the Wi-Fi Protected Access 2 (WPA2) security protocol?
    6·1 answer
  • When selecting text in word, holding down the ctrl key while clicking the mouse button will select the?
    15·1 answer
  • Which style did Jack use on the vocabulary words in reports?
    14·2 answers
  • (fill in the blank) <br><br> ____ is when data is formatted, transmitted and received in a network.
    13·1 answer
  • IT specialists must display technical expertise and collaborative proficiency in the workplace. Select the IT specialist who dem
    7·1 answer
  • Command create database in oracle database ::((
    8·1 answer
  • What product use programmable control?
    11·1 answer
  • Write Epic username plz
    6·1 answer
  • What feature preserves your open apps and data, but allows another user to log in to his or her own session of the same computer
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!