1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tamiku [17]
3 years ago
7

Don't pat any attention to this

Computers and Technology
2 answers:
Lynna [10]3 years ago
6 0

Answer:

Too late....

Explanation; Rip

Sauron [17]3 years ago
4 0

Answer: what? do you need any help, bc I can help with any question you have

Explanation:

You might be interested in
How would a designer interpret the word denier?
xxMikexx [17]

Answer:Denier is a unit of measurement that is used to determine the fiber thickness of individual threads or filaments used in the creation of textiles and fabrics. Fabrics with a high denier count tend to be thick, sturdy, and durable. Fabrics with a low denier count tend to be sheer, soft, and silky.

Explanation:

idk if this is right.

7 0
3 years ago
Read 2 more answers
What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential infor
Alex_Xolod [135]

Answer:

eavesdropping

Explanation:

Eavesdropping is as an <em>electronic attack</em> where digital communications are intercepted by an individual whom they are not intended. This is done in two main ways: <em>Directly listening</em> to digital or analog voice communication or the <em>interception or sniffing</em> of data relating to any form of communication.

4 0
3 years ago
Blind spots are those areas not reflected in your:
bulgar [2K]
The answer is C because your sideview and rearview mirrors are there specifically to check behind you, while the vanity mirror is not supposed to be used for the same purpose.
8 0
3 years ago
Read 2 more answers
Which of the following is not a good technique for photographing groups? Visiting the location.
algol13
I think it's wait until you get started to decide on the props and camera settings...
4 0
3 years ago
Choose the term that describes each step of the cycle.
stich3 [128]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about to tell the best and suitable terms for the given descriptions in the question.

As we know that a computer program is based on sets of instructions. The CPU carries out the processing using the fetch decode and execute cycle.

It is responsible for implementing a sequence of instructions called a computer program that takes input, processes them, and outputs the result based on processing.

A CPU mainly has three components such as control unit, Arithmetic logic unit,  and register.

The control unit controls all parts of the computer system. It manages the four basic operations of the Fetch Execute Cycle such as Fetch, Decode, Executes, and Storage.

So the correct terms of this question are:

Fetch: Gets next instruction

Decode: interprets the instruction

Execute: Carries out instruction.

Store: Save results of instruction.

5 0
2 years ago
Other questions:
  • A school librarian has been asked to identify inappropriate Internet usage. Which students would most likely be reported to the
    5·2 answers
  • Create a simple main() that solves the subset sum problem for any vector of ints. Here is an example of the set-up and output. Y
    12·1 answer
  • Which information is necessary to determine an object's speed?
    13·1 answer
  • Wap-enabled devices require a ________, a special web browser that has all the features of computer-based browsers but is simpli
    11·1 answer
  • Jennifer's company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting
    14·1 answer
  • Does functionality provided by the app play an important role in a decision to
    13·1 answer
  • What is WEB 1.0 to WEB3.0
    11·1 answer
  • The Internet is considered a WAN. *<br><br> True<br> False
    9·1 answer
  • ________models software in terms similar to those that people use to describe real- world objects.
    6·1 answer
  • Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and ins
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!