1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
9

An example of a current disruptive technology is a?

Computers and Technology
2 answers:
frutty [35]3 years ago
8 0

Answer: smart watch

Explanation:

Apex approved

guapka [62]3 years ago
6 0
Smart Watches are taking over normal watches. They are getting WAYYY cheaper. There is one for about $14
You might be interested in
Can you run microsoft office on a chromebook
zimovet [89]
Yes, you can Microsoft office in a Chromebook.
6 0
4 years ago
Four possible skills a person could have
cluponka [151]

Answer:

Active listening skills.

Genuine interest in others.

Flexibility.

Good judgment.

Explanation:

4 0
4 years ago
What measures are needed to trace the source of various types of packets used in a DoS attack? Are some types of packets easier
cestrela7 [59]

<u>Explanation:</u>

Note, a DoS (Denial of Service) attack is <u>different in scope from a DDoS (Distributed Denial of Service) </u>attack. In a DoS attack, the attack on the website's network comes from just a single source (IP address) repeatedly, while in a DDos attack several Ip addresses or sources attack the network of a website.

To trace the source of various types of packets used in a DoS attack (which of less complexity than a DDos attack), a software application like Wireshark could be used to measure trace the packets used in the attack.

4 0
3 years ago
Choose the function described.
jasenka [17]

Answer:

clear

Explanation:

6 0
3 years ago
Read 2 more answers
A system administrator runs a file scan utility on a Windows PC and notices a file lsass.exe in the Program Files directory. Wha
skelet666 [1.2K]

Answer: It would be better to treat the file as malware and delete it.

Explanation:

File Isass.exe keeps hold of the username and password as one logins to the windows upon launching. So when we encounter the file Isass.exe in the program files directory then it would be better to delete it as it is a malware.

3 0
3 years ago
Other questions:
  • ASAP
    12·1 answer
  • Suppose we are given an arbitrary digraph G = (V, E) that may or may not be a DAG. Modify the topological ordering algorithm so
    8·1 answer
  • The data manipulation language (DML) of SQL contains SELECT, INSERT, DELETE, and UPDATE statements, whereas the data definition
    12·1 answer
  • . Use of communications and information systems that are familiar to users is a part of which key principle? A. Security
    14·2 answers
  • Edward uses the self-timer drive mode on the camera to set a time delay on the closing of the shutter. What does this mode allow
    9·1 answer
  • Which input device can advanced computer users use instead of a mouse to perform tasks such as opening new windows and saving or
    15·1 answer
  • Select the three business advantages of globalization.
    10·1 answer
  • Write a program that: Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers in the list (hint:
    5·1 answer
  • Means storing,accessing information over the internet other than hard drive and your system
    15·1 answer
  • If the bookstore sold 8 books for $66 at that rate how much was one book
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!