1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KATRIN_1 [288]
3 years ago
10

Can anyone help? Please.

Computers and Technology
2 answers:
zloy xaker [14]3 years ago
7 0
The first riddle would be a baby crawling on all fours, then walking on two legs as an adult, and then walking with two legs and a cane as an elder. 

The second riddle would be the letter "E"
End, timE, spacE, Every placE. 

I hope this helps :)
Shtirlitz [24]3 years ago
3 0
I can’t see it... can you type it out please?
You might be interested in
There is a renewed focus among today’s parents on providing food to their family.
BlackZzzverrR [31]

Answer:

The answer is "healthful".

Explanation:

  • In ancient times the vast majority of people lacked food, parents aimed at providing their family members with adequate food. Recent months, interestingly, also made parents should be aware of providing a healthy diet for their children, including links to being enough and a wide taste of options.
  • In societies of food scarcity, it could see that the main concern of families continues and provide subsistence families with sufficient food. It is careful to prevent a common "good food".
8 0
2 years ago
Leah wants to add an image to her updated presentation, so she wants to access the Help interface. What should Leah do to access
PSYCHO15rus [73]

Answer: 0

Explanation: 1/2

3 0
2 years ago
Read 2 more answers
Should the use of hacktivists by a country against enemy organizations be considered an act of war? Why or why not? How about th
Artyom0805 [142]

Explanation:

Hacktivist comes from the combination of two words --- "Hack" and " Activism" .

Hacktivist perform hacktivism that means they make use of technology and knowledge to support as well as promote the political agenda and any kind of change in the social event.

Cyberterrorism, on the other hand uses internet and technology and conduct terrorism and other anti national activities like to coerce the societies or the governments in pursuit of their goals which are  religious, ideological or political.

While Hacktivism is used for a political cause, and is done in a peaceful manner; whereas cyber terrorism tries to grab the attention of the public through their aggressive ways, specifically by putting fear among the public.

But there is no instance of any person of getting killed by a cyber-attack or cyber terrorism. The larger damage is however done by those viruses or malware which gets into other persons computers or enemy organization computer system and weakens them and steals information and data. They damage and harm the economy in a larger scale.

When Chinese government first introduced the Trojan virus on the computer systems of their opponents abroad, is that can be called as Hacktivism? In  essence, this act may be called as cyber terrorism and not hacktivism. Because the Chinese Government intend to cause major economic damage and harm to their opponents or enemy organization by targeting the software giants in the West.

These companies crashed and and many left jobless and unemployment, they caused economic problems and damage to the technologies.  However, the Chinese Government's perspective on this is that they addresses such a thing as hacktivism as it advocates the state censorship by filtering the politically or the socially-unacceptable ideas in their e-mail.

Thus, the answer is relative as to whose perspective we are looking. Either we are taking the perspective of the Chinese government or that of the enemy organization which is affected by the act of the state censorship and targeting the Western software giants.

Cyberterrorism will somehow become a serious threat to the society when people adept at hacking will sympathize and also align with terrorists activities and cause. It has become appealing since some of computer programs have the features that are easily exploited and conducive for committing cyber terrorism.

3 0
3 years ago
Which of the following is designed to help an organization continue to operate during and after a disruption?
Olenka [21]

Answer:

d

Explanation:

cause people need a care for there incedents that not expected thats why people need help prevent from a risk to save people lives

7 0
2 years ago
Two different ways to bring up My Computer folder
seraphim [82]
On a Windows PC, My Computer is a folder on the desktop. Alternatively, you can click on Start and access My Computer from that menu.
5 0
3 years ago
Other questions:
  • Choose the type of critical thinking demonstrated in the example:
    8·2 answers
  • when seeking information on the on the internet about a variety of subjects the most useful place to look would be?
    13·1 answer
  • After reviewing the various types of network connections available, a client chooses a network connection that is considered to
    13·1 answer
  • If you've been a victim of identity theft, what should you do after contacting the company that reported the suspicious charge a
    9·1 answer
  • It is important to ____ the line in the code editing window in the exact location where you want to insert a code snippet to pro
    10·1 answer
  • Multiple Choice: We have been assigned the task of developing a software testing tool (tester) that can assess reachability of s
    11·1 answer
  • In 3-5 sentences describe whether or not files should be deleted from your computer explain your answer
    12·1 answer
  • If you hard working right now go to this EASY question
    9·2 answers
  • Write a program that reads a list of integers, and outputs the two smallest integers in the list, in ascending order. The input
    5·1 answer
  • Which components must all tasks have? Check all that apply.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!