1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Whitepunk [10]
3 years ago
6

What languages do most of the students at Miami High School speak?

Computers and Technology
2 answers:
zepelin [54]3 years ago
5 0
Spanish is the most language spoken in the highschool

Sonbull [250]3 years ago
4 0
I would say English, but Spanish could be a possibility.
You might be interested in
________ is a markup language that allows for tagging selected elements of the content of documents for their meanings and is us
trasher [3.6K]

Answer:

E)nXML

Explanation:

XML is a short for Extensible Markup Language. It is a markup language like the Hypertext markup language (HTML) and are both used in the development of web applications. However while the HTML describes the content of the Web page that is the graphics, images and videos and how they are displayed, the XML handles the description of data and information formats, their storage and the transportation and sharing over the internet.

4 0
3 years ago
Read 2 more answers
In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
Neporo4naja [7]

Script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

<h3>The types of threat actors.</h3>

In cybersecurity, there are different types of threat actors and these include the following:

  • Script kiddie
  • Gray hat hacker
  • Hacktivists

One of the ways to differentiate an attack orchestrated by a script kiddie from that of a gray hat hacker is that script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

4 0
2 years ago
an images scanned from a CD cover does not have to be cited because you didn't find the image on the internet True or false
ruslelena [56]

Answer:

False

Explanation:

When searching on the internet, I found flashcards containing this information.

6 0
3 years ago
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
Brilliant_brown [7]

Answer:

True.

Explanation:

An investigator would like to do an internet-based college student survey to gather data regarding their behavior as well as drug use. Even so, specific identifications are still not gathered and IP addresses might be available in the set of data. Damage threat must be assessed both by the magnitude (or severity) and the likelihood (or likelihood) of the hurt.

7 0
4 years ago
Drag the tiles to the correct boxes to complete the pairs.
lianna [129]

Answer:

software

client devices

hardware

Explanation:

Plzzzzzzzzzzzzz give me brainiest

4 0
3 years ago
Other questions:
  • In Word, tables can be styled much like text can.<br> True<br> False
    6·1 answer
  • What piece of software tells the operating system how to use a specific hardware device?
    14·1 answer
  • The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent leg
    11·1 answer
  • Write a program that displays the values in the list numbers in ascendingorder sorted by the sum of their digits.
    8·1 answer
  • Each AWS region is composed of two or more locations that offer organizations the ability to operate production systems that are
    7·1 answer
  • Design by contract considers the software system to be a setof:
    10·1 answer
  • A quien se le conoce como el padre de la tecnologia?
    10·1 answer
  • A person is riding a bike and accelerating at 2.8 m/5 2 eith a force of 100 n
    6·1 answer
  • Software created according to user choice​ true or false
    5·1 answer
  • The ____ line for any e-mail messages you write should clearly state the intention of the e-mail..
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!