1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alchen [17]
3 years ago
6

PLEASE HURRY

Computers and Technology
1 answer:
julsineya [31]3 years ago
5 0

Answer:

the second one I believe

You might be interested in
Chris needs to modify the default bullets that are used in a nonnumbered list in Word.
laiz [17]

Answer:

he should select the arrow next to the bullet list

Explanation:

6 0
3 years ago
Read 2 more answers
What laws are broken when you hack someone?
postnew [5]

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

6 0
3 years ago
Need help with 4.7 lesson practice
OverLord2011 [107]

Answer:

1.a

2.sorry cant read it that wekk

3.c

Explanation:

7 0
3 years ago
Why will it take so long to complete the high-speed rail route?
koban [17]
It will take a while for all of the necessary safety inspections. 
3 0
3 years ago
Read 2 more answers
Which of the following is an example of a fixed expense clothing or rent or entertainment or food
V125BC [204]
Salutations!

<span>Which is an example of fixed expense?

Rent is an example of fixed expense, It doesn't matter whether you sell a widget or produce thousand of them, you must still pay the rent in any </span><span>circumstances.
</span>
Hope I helped.
5 0
4 years ago
Other questions:
  • For film editors, which task comes last in their workflow pattern?
    12·2 answers
  • _______ are unprocessed facts that a computer feeds on.
    5·1 answer
  • What is a sluggish beta signal detection theory?
    15·1 answer
  • Which of the following types does the Java programming language support?
    9·2 answers
  • What is the syntax of an of if statement
    13·1 answer
  • Consider a system running ten I/O-bound tasks and one CPU-bound task. Assume that the I/O-bound tasks issue an I/O operation onc
    14·1 answer
  • Write a method intersect that accepts two sorted array lists of integers as parameters and returns a new list that contains only
    8·1 answer
  • Assume you are a security professional. You are determining which of the following backup strategies will provide the best prote
    10·1 answer
  • 12. How many different documents can<br> you have open at one time?
    8·1 answer
  • 1. What type of malware is triggered by a specific condition, such as a specific date or a particular user account being disable
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!