1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
3 years ago
15

Which of these is a subdirectory? HTTPS /FAQ .org WWW

Computers and Technology
1 answer:
Katyanochek1 [597]3 years ago
8 0

Answer:

/FAQ

Explanation:

You might be interested in
I make a budget of my 1st Gamer PC its good?
svet-max [94.6K]

Answer:

Good start

Explanation:

I'm not <em>super</em> knowledgeable about computer hardware but the 16gb of ram seems like a good decision but the biggest thing I reccomend is allocating more money towards storage. Even just getting a normal HDD for your games might be a good idea because the newest CoD game is 84gb so you will fill that SSD up quicky.

8 0
3 years ago
Compare the graphs. Find the value of h, k, or a.
Serga [27]

Answer:

dchdchbhdcdc

Explanation:

6 0
2 years ago
What is microsoft access?
atroni [7]
Microsoft Access is a database management system that is part of the Microsoft Office Suite.
8 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
"running computer programs and their data are stored in ___"
Lesechka [4]

Solution:

Running computer programs and their data are stored in Rom.

ROM is "built-in" computer memory containing data that normally can only be read, not written to. ROM contains the programming that allows your computer to be "booted up" or regenerated each time you turn it on. Unlike a computer's random access memory (RAM), the data in ROM is not lost when the computer power is turned off. The ROM is sustained by a small long-life battery in your computer.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Write a brief one parapragh summary describing the financial reality of the American family.
    10·1 answer
  • The CPU package is installed using the ____ process
    7·1 answer
  • HURRY UP !!!!!!’<br> Each packet is addressed to the recipient's .
    8·1 answer
  • What is Mainframe computer​
    15·1 answer
  • What is wrong with line 1?
    14·1 answer
  • Implement RandMultipByVal function, which gets one integervariable as its argument
    12·1 answer
  • Marys total out of pocket costbwere for the year​
    12·1 answer
  • What is a boolean in Java
    5·1 answer
  • If you hard working right now go to this EASY question
    9·2 answers
  • Priortization is an example of a skill that helps you reach long term goals because
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!