1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlada [557]
2 years ago
11

A typical, small, dry cell battery has a voltage of A. 6.0 volts. B. 1.0 volts. C. 12.0 volts. D. 1.5 volts.

Computers and Technology
2 answers:
irina1246 [14]2 years ago
7 0
The answer is  d 1.5 volts
Bad White [126]2 years ago
6 0
The answer is D 1.5 volts
You might be interested in
Which software-development methodology would be best if an organization needed to develop a software tool for a small group of u
xxTIMURxx [149]
I think prototyping model is best
3 0
2 years ago
Policies and procedures set by companies are established to :
frozen [14]

Answer:

The answer is below.

Explanations:

maintain the affairs or rules of conduct of the company, including both the employer and the employees.

The Policies and procedures set by companies will clearly state the responsibilities and duties of both employer and employees, which eventually serve as a means of protecting the interest of all the parties involved in a company.

4 0
2 years ago
Every computer consists of physical components and nonphysical components. the nonphysical components of a computer that underst
IrinaVladis [17]
Physical component means Computer Hardware which you can touch and non Physical component means Software, which you can not touch. nonphysical component designed specially for physically component. like Microsoft company designed Software according the Hardware for example Microsoft windows 64 bit could not install on which 32 bit Architecture Hardware.
7 0
3 years ago
A hacker corrupted the name:IP records held on the HOSTS file on a client, to divert traffic for a legitimate domain to a malici
balu736 [363]

The type of attack that the hacker performed is Domain Name System (DNS) server cache poisoning.

<h3>What is DNS poisoning?</h3>

In Domain Name System (DNS) server cache poisoning, the hackers often enter into a DNS server because they want to make an adjustment to its directory so that it can point the domain name users enter to a wrong, IP address.

Note that Domain Name Server (DNS) poisoning is a form of system attack in which there is the change of DNS records which are then used to redirect online traffic to a wrong website.

Learn more about hacker  from

brainly.com/question/24956493

7 0
2 years ago
An intruder with malicious intent breaks into an office and steals a hard drive
Leya [2.2K]

Based on the above, the type of security is illustrated in this example is known as data security.

<h3>What is Data security?</h3>

This is known to be the act of keeping safe data from unauthorized access and its corruption in all of its lifecycle.

Note that in the case above, the intruder is interested in the companies data and as such,  the type of security is illustrated in this example is known as data security.

Learn more about  security from

brainly.com/question/15668437

#SPJ1

6 0
2 years ago
Other questions:
  • Why is it important to evaluate the website on which you plan to shop?
    11·2 answers
  • When talking about the physical elements of the internet, the term redundancy refers to:?
    13·1 answer
  • Create a new file that builds a shopping list from a user. There should be a input query that asks the user to list an item and
    11·1 answer
  • What important practice can help prevent hardware trouble?
    6·1 answer
  • Nielsen purchases scanner data from retail transactions to track the sales of consumer packaged goods, gathered at the point of
    14·1 answer
  • Marie has never used a word processor. In 3 to 4 sentences, describe how she could benefit from using a word processor to comple
    7·2 answers
  • 2 Manter o autocontrole nos ajuda a evitar muitos problemas na nossa vida pessoal e no ambiente profissional. Em se tratando de
    14·1 answer
  • What is it called when servers on the Internet supply applications as a service, rather than a product
    14·1 answer
  • Which of the following is true?
    11·1 answer
  • How can random numbers in a range be generated in Java?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!