1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
3 years ago
13

Select the correct answer.

Computers and Technology
1 answer:
STALIN [3.7K]3 years ago
8 0

Answer:

Click a button labeled edit to edit the message

Explanation:

You might be interested in
Moving your Sprite top to bottom is moving along the X coordinate?
Marianna [84]
The answer is false
6 0
3 years ago
WEP (Wired Equivalent Privacy) has a design flaw which allowed attackers to break its encryption codes, WPA2 ( 2) has not suffer
ad-work [718]

Answer:

The answer is "True"

Explanation:

In computer science, the IEEE project uses this security project, it is designed for wireless network, that provides the same level security and the data encryption for cable network also.

  • It provides protects in wireless transmissions from both the poking and collecting information of packets.  
  • It also lets hackers crack their computer, that's why the given statement is true.
3 0
3 years ago
What is output? c = 1 sum = 0 while (c < 10): c = c + 3 sum = sum + c print (sum)
Valentin [98]

Answer:

21

Explanation:

The values of c that make it into the loop are 1, 4, 7.

The values that are added to sum are 3 higher, i.e., 4,7 and 10.

The sum of those is 21.

p.s. why did you not run the program yourself?

3 0
3 years ago
You wish to share cases created and owned by your community users (Customer Community Plus) with the internal product support te
emmainna [20.7K]

Answer:

The correct answer is option C. Custom Sharing Group

Explanation:

A custom Share group enables users to share documents which are being held by the high-volume community and portal users with the internal and external users. This Share groups relate all over portals or communities and are connected with sharing sets. Sharing rules and regulations are utilized to expand sharing accessibility to users in public groups or roles. They enable greater access for specific users.

8 0
3 years ago
If you were looking for a record in a very large database and you knew the ID number, which of the following commands would be t
OLga [1]

Answer:

The Correct answer is Find.

Explanation:

7 0
3 years ago
Other questions:
  • In databases and database-related software, which choice is not a Boolean operator?
    7·2 answers
  • Impact of computer on education
    6·2 answers
  • Write a method named lastFirst that accepts a string as its parameter representing a person's first and last name. The method sh
    13·1 answer
  • Amanda needs to create an informative print brochure for her local library’s fundraiser dinner. What critical detail must she ha
    14·2 answers
  • Are the actions legal or illegal?
    13·1 answer
  • A spreadsheet has some values entered: Cell A1 contains 10, cell A2 contains 14, A3 contains 7. You enter in cell A4 the followi
    8·1 answer
  • The first computer program was used to help the analytical engine calculate numbers. Who invented that program?
    6·1 answer
  • Select one type of mobile phone connectivity you can use to stream videos on a smartphone
    10·2 answers
  • How do we make a acount
    15·2 answers
  • Assign listNodes with all elements with a clasa name prog-lang
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!