1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Annette [7]
3 years ago
14

5255555555555+55555555555555/1111*99442

Computers and Technology
2 answers:
Marina CMI [18]3 years ago
7 0

Answer:

(502763134343429265 /101)

Explanation:

bixtya [17]3 years ago
7 0

Answer :what?

Explanation:

You might be interested in
This is for the folks that is rude:
S_A_V [24]
This isn’t twitter but anyways the answer is 29
8 0
3 years ago
Sharon's company has written a new computer program, and she has been asked to find a way to prevent people from copying the sof
Tasya [4]

Answer:

Sharon's company has written a new computer program, and she has been asked to find a way to prevent people from copying the software they purchase and giving it to others who have not purchased the software. What can Sharon's company do to make sure a customer who p…

A:

Use DRM.

Explanation:

Use DRM.

8 0
2 years ago
Read the four detective reports and the combined affidavit and warrant for the M57 Patents case. Write a one- to two-page paper
Fantom [35]

Answer:The 2009-M57-Patents scenario tracks the first four weeks of corporate history of the M57 Patents company. The company started operation on Friday, November 13th, 2009, and ceased operation on Saturday, December 12, 2009. As might be imagined in the business of outsourced patent searching, lots of other activities were going on at M57-Patents.

Two ways of working the scenario are as a disk forensics exercise (students are provided with disk images of all the systems as they were on the last day) and as a network forensics exercise (students are provided with all of the packets in and out of the corporate network). The scenario data can also be used to support computer forensics research, as the hard drive of each computer and each computer’s memory were imaged every day.

Explanation:

4 0
3 years ago
click attachment to see correct answer. Which agencies run the Landsat Program? The Landsat program is run by ___ and ___.​
Ksju [112]

Answer:

ancient times were nicr

Explanation:

5 0
2 years ago
Which of the following statements about security in the network is true?
Ilya [14]
I believe that answer A is true
5 0
3 years ago
Other questions:
  • Which column and row references are updated when you copy the formula: =F$5+12? Value 12 Column F Column F and row 5 Row 5
    8·1 answer
  • If you wanted to search for emails containing the word advanced and prevent emails containing the word new from appearing in the
    14·1 answer
  • How might writing an online journal be different than writing in a paper one ​
    15·2 answers
  • Populate a one-dimensional array with the following grades in this order: 90, 61, 74, 42, 83, 51, 71, 83, 98, 87, 94, 68, 44, an
    15·1 answer
  • Which attribute of the image tag specifies the URL of an image
    14·1 answer
  • Activity
    7·1 answer
  • What is the value of the variable result after these lines of code are executed?
    11·1 answer
  • Are there any apps in the App Store that allow people to ask a question about any topic and have skilled professionals answer it
    6·1 answer
  • Which view would you need to use to make changes to the design theme for the entire presentation?
    10·2 answers
  • Explain why it is important that the device registration is the last thing that is done in the initialization routine of a devic
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!