1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergiy2304 [10]
4 years ago
7

I only want someones opinion on this not anything you would find in a book.

Computers and Technology
1 answer:
Hoochie [10]4 years ago
4 0
As a missile training device in the 80s to help train the anti missile defense personnel to take down nuclear missiles.
You might be interested in
You can use the Ignore All button to ignore the current and all future occurrences of a flagged word. True or False
Pepsi [2]

Answer: True

Explanation: "Ignore All" button is the button that operates when the user wants to ignore the word that is flagged .Flagged words are those which chosen by user to be banned and don't want to use in future.

Ignore all button helps in the ignoring of the spelling check of the words that the user is sure about and the words that user don't want to be the part of their content.This banning is for the future use and current time as well.Thus, the statement is true.

4 0
3 years ago
When several computers connected to the Internet have been set up to forward spam and sometimes viruses to other computers on th
balu736 [363]

Answer:

Option D: Botnet

is the correct answer.

<h3>When several computers connected to the Internet have been set up to forward spam and sometimes viruses to other computers on the Internet, <u>Botnets </u>are responsible. </h3>

Explanation:

A Botnet can be taken as the combination of two words "robot" and "networks". Botnets are used in depicting the malicious content as the breach the network security. They are used for stealing data by Distributed Denial of Service attack (DDoS) and by sending spam to all other devices connected to a network. All this scheme is managed by the attacker itself.

All other listed options spread malicious data by some other means.

I hope it will help you!

4 0
3 years ago
I have an LG phone. I also haven't paid my phone bill yet, so I can't send text messages. I playfully texted texts to people and
Eddi Din [679]

Answer:

it probably will not

Explanation:

8 0
3 years ago
How dependent are we on technology? ​
rusak2 [61]

very independent  : ) we use it for everything

3 0
3 years ago
Read 2 more answers
Question 7 (1 point)<br> Increasing hue levels means increasing saturation.<br> True<br> False
Temka [501]

Answer:

mae me brainlier

false

7 0
3 years ago
Other questions:
  • Write a C++ function, lastLargestIndex that takes as parameters an int array and its size and returns the index of the last occu
    10·1 answer
  • Say our confusion matrix is as follows, calculate precision, recall, and accuracy. Interpret the results for the positive class.
    10·1 answer
  • One suggested means of gaining eye contact before reversing is to:____.
    12·1 answer
  • Print a countdown from n to 1 The function below takes one parameter: an integer (begin). Complete the function so that it print
    8·1 answer
  • In powerpoint a point is _____ of an inch in height.
    6·1 answer
  • Create a page using PHP for a business website that will ask the user to enter his or her name into text boxes and will display
    5·1 answer
  • Code in Java:
    6·1 answer
  • With social media presence growing why is cyberbullying at an all time high
    8·2 answers
  • What are three ways digital identity is created and kept up? (open answer)
    5·1 answer
  • Which wireless technology will John use to provide wide-range cellular service that focuses on indoor coverage, low cost, long b
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!