1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
4 years ago
8

Once jaden has decided upon the telecommunications technology his team will use, he will have completed the last step of the dec

ision-making process. truefalse
Computers and Technology
1 answer:
mrs_skeptik [129]4 years ago
6 0
<span>Once Jaden has decided upon the telecommunications technology his team will use, he will have completed the last step of the decision-making process. TRUE.</span>
You might be interested in
A wall is built of bricks. What force is being applied to each brick from the bricks above? ​
ValentinkaMS [17]

Answer:

Gravitational Pull is the force that is being applied to each brick.

5 0
3 years ago
What is the definition of the components that motherboards, ssds, processors, and cases are part of?
iVinArrow [24]
Necessary carrying components
3 0
3 years ago
Who was responsible for unleashing the melissa computer virus
CaHeK987 [17]

Answer:

David L. Smith

Explanation:

Around March 26, 1999, the Melissa virus was released by David L. Smith

‘Melissa.A’ used social engineering techniques, since it came with the message “Here is the document you asked me for…  do not show it to anyone”. In just a few days, she starred in one of the most important cases of massive infection in history, causing damage of more than 80 million dollars to American companies. Companies like Microsoft, Intel and Lucent Technologies had to block their Internet connections due to its action.

How it Works

When opening a document infected with the ‘Melissa.A’, the virus creates an e-mail with the following features:

Subject: Important Message From “sender name”

Text: Here is that document you asked for … do not show anyone else

Attachments: a file with a DOC.

The recipients of this message were the first 50 addresses ‘Melissa.A’ found in the address book in Outlook. This was the first macro virus that used this technique, until this moment there hadn’t been a virus that affected users by sending a Word document within an email.

What Happened

The creator of ‘Melissa.A’, David L. Smith, pleaded guilty but said he did not expect such high economic damage. This malware was created in memory of a topless dancer in Florida with whom he had fallen in love with.

Smith was sentenced to 10 years in prison.

6 0
3 years ago
An algorithm to find the perimeter of a triangle
KiRa [710]

Answer:

step 1- start

step 2- Input a,b,c

step 3 - perimeter = a+b+c

step 4 - Print the perimeter

step 5 - End

5 0
2 years ago
Which of these sedimentary rocks is made of the largest particles?
Marta_Voda [28]
Your answer is <span>A.conglomerate.

Hope this helps :)</span>
6 0
4 years ago
Other questions:
  • Write a multithreaded program that generates the Fibonacci series using Pthreads thread library. This program should work as fol
    10·1 answer
  • Programmers say the data items are ____ only within the module in which they are declared.
    5·1 answer
  • What type of memory can support quad, triple, and dual channels?
    5·1 answer
  • What is the output of the code snippet given below? string s = "aeiou"; int i = 0; do { system.out.print(s.substring(i, i + 1));
    12·1 answer
  • Suppose that TCP's current estimated values for the round trip time (estimatedRTT) and deviation in the RTT (DevRTT) are 400 mse
    9·1 answer
  • Does anyone have game design in connections
    13·1 answer
  • Why do we need IP Addresses in order for the Internet to function properly?
    7·1 answer
  • How is digital footprint created ?
    15·1 answer
  • What is the default return type of a method in Java language?
    9·2 answers
  • Which is not and input device , keyboard , joystick, Monitor, Microphone​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!