1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vika [28.1K]
3 years ago
11

WHOEVER ANSWERS ILL MARK BRAINLIEST HELP __________ are indigenous Filipinos who have studied at major domestic and foreign coll

eges and universities.
Social Studies
1 answer:
antoniya [11.8K]3 years ago
3 0

The correct answer is Austronesian

Explanation:

You might be interested in
To Take as a prisoner in battle ?<br> Word from 7 letters
Assoli18 [71]
I am guessing HOSTAGE or CAPTURE
8 0
3 years ago
the articles of confederation gave the confederation congress all of the following powers except the power to
olya-2409 [2.1K]
<span>The articles of confederation gave the confederation congress all of the following powers except the power to impose taxes.</span>
7 0
3 years ago
Who is the tallest man to live?
fomenos

Robert Pershing Wadlow at 8'11"

3 0
3 years ago
Why did farmers need to develop a system to control their water supply?
Neko [114]
Farmers needed to control their water supply because they can either have too much water or too little. Too much and their crops drown, too little and they dry up. Another reason is because they needed to provide dams to control flooding when rivers overflowed when things thawed in the spring, or during heavy rain fall, and to be able to have water during a drought. Speaking of a drought, they can use up too much water and cause a drought in big farming areas. Hopes this answers your question!
3 0
3 years ago
In which technique does an attacker acquire a trusted address that allows the attacker to communicate with the access point?
yarga [219]

Answer:

Network / MAC Sniffing

Explanation:

Network sniffing is the method of intercepting packets of data sent through a network. A specialized software or hardware equipment can do this.

Computer systems interact via IP addresses by broadcasting messages over a network.

When a signal is sent to a system, the receiver's machine with the matching IP address will respond with its MAC address.

MAC Sniffing can:

  • <em>Collect sensitive information like login information </em>
  • <em>Conduct surveillance on text conversations </em>
  • <em>Save files which were transmitted across a network</em>
5 0
3 years ago
Other questions:
  • What mountain range borders India to the northeast
    10·1 answer
  • Many at the continental congress were skeptical of allowing presidents to be directly elected by the legislature because _______
    9·1 answer
  • Which of the following is the newest department, having been established after September 11, 2001? A Interior B Education C Home
    7·1 answer
  • After experiencing abuse during her childhood, fae developed several identities. fae often switched between a character named ca
    5·1 answer
  • White tail deer live in the Piedmont region of Georgia. Part of the forest has been cut down to build a new shopping center. Wha
    8·2 answers
  • When many American Indian slaves died of European diseases, they were replaced with __________.
    14·2 answers
  • Why do the islands of the Caribbean Sea have so many different cultures
    14·1 answer
  • Marie is 6 months old. When you, her mother, hear the cries of hunger, you come and feed her; and when Marie is uncomfortable, y
    12·1 answer
  • Which action is an example of direct democracy
    5·2 answers
  • What causes government instability
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!