1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bezimeni [28]
3 years ago
5

You want some points? whoever answers first gets 48 points. no cap. better be quick.

Computers and Technology
2 answers:
LekaFEV [45]3 years ago
5 0

Answer:

4

Explanation:

fgiga [73]3 years ago
5 0

Answer:

4444444444444444444444444

You might be interested in
To keep information beyond reach of unauthorized users, is to keep the information _____. Group of answer choices simple verifia
nasty-shy [4]

Answer:

Secure is the correct answer for the above question.

Explanation:

  • When any person wants that any information is not hacked by any user then he needs to secure the information with the help of any security mechanism. This security mechanism can be of any type that facilities the user to stop the information are being hacked.
  • The above question asked about the work which is needed to stop the message is being hacked. So there is a need to secure the information. so secure is the correct option while the other option is not valid because "simple, economical or verifiable" can not stop the message from accessed by the unauthorized user.
7 0
3 years ago
look at sum of my horrible drawings lol these were last year XD let meh see sum of yalls art!! im not into drawing as much but i
Snowcat [4.5K]

Answer:

Explanation:

but i drew eyes like your but digtal

5 0
2 years ago
______design A plan for the actual implementation of the system.
Stella [2.4K]

Answer:

please

Explanation:

6 0
3 years ago
Read 2 more answers
In the beginning of wireless technology, some devices used _____ technology to "beam" information from one source to another sou
sveticcg [70]

Answer:

D. infrared.

Explanation:

Wireless technology for communication uses electromagnetic wave to transmit signals between location. It eliminates the need of cables for connecting network devices.

In previous wireless technology implementation, Infrared rays were used (in tv remotes), which needed to be in the line of sight to its destination. Although it was fast, it has many limitations for a long-haul transmission like its short transmission range, easily blocked by objects and its uni-directional properties.

4 0
3 years ago
Name the technique used to separate the mixture of colours in black ink ​
Nitella [24]

Answer:

chromatography

hope it helps

6 0
2 years ago
Read 2 more answers
Other questions:
  • A Web ____ is a software program that retrieves the page and displays it. Select one:
    5·1 answer
  • Write a method so that the main() code below can be replaced by the simpler code that calls method mphandminutestomiles(). origi
    14·2 answers
  • Which course must first-time drivers in Florida take to be eligible for their Learner License?
    11·1 answer
  • In your own words, describe what Internet Protocols are. Why is it important to have agreed upon protocols?
    6·1 answer
  • So I was wondering how I should get into Game Development?
    12·1 answer
  • Howard is leading a project to commission a new information system that will be used by a federal government agency. He is worki
    7·1 answer
  • ________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared po
    9·1 answer
  • Your employer is opening a new location, and the IT director has assigned you the task of calculating the subnet numbers for the
    14·1 answer
  • All NATE specialties are offered at two levels, A. journeyman and master. B. installation and service. C. apprentice and journey
    7·1 answer
  • How to print wireless from laptop to samsung printer?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!