1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
geniusboy [140]
3 years ago
10

If a hypothesis is strongly supported by the scientific community based on compelling experiment results, it becomes a————

Computers and Technology
2 answers:
goblinko [34]3 years ago
8 0
Yea I think it would fact.
SOVA2 [1]3 years ago
6 0
I'm pretty sure it becomes a fact.

You might be interested in
In programming, what is a string?
Alla [95]

A way to store a sequence of letters, numbers or symbols.

This is the most accurate statement, though not entirely true.

Hope this helps.

7 0
3 years ago
Read 2 more answers
A company is concerned that hackers may gain access to its computer system or that it may be
lesantik [10]

Answer:

computer virus is an spreading disease in a computer

Explanation

a virus can be spread through many ways by servers , wifi ,and the cloud

so its better to have an safe and secure firewall by your domain or you could use cloud computing to test viruses

it also can spread pretty fast so u better have a good antivirus

4 0
2 years ago
A group known as ""Takedown"" hacked into your political action committee website and defaced it. Which type of threat actor is
natima [27]
<h2>Answer:</h2><h3>Hacktivist group is most likely to responsible for this.</h3><h3 /><h2>Explanation:</h2>

Hacktivism is defined as an action in which a computer or a network is targeted so that it could be misused in order to achieve a goal against any social or political action.

Hacktivists are the persons who perform hacktivism in order to seek attention on a specific thing or issue they want, from all the people.

In the given scenario, the hacking attack is hactivism as it is done to pull the company down.

Hacktivist can be a single person as well as a group of people working together. However they try to work anonymously so that they could not be traced.

<h3>I hope it will help you! </h3>
6 0
3 years ago
When naming a file you should use the ___ instead of a space in a filename
Ymorist [56]
The underscore.
But actually you can use spaces in file names, in many file managers. I think it just shows you a space while it actually saves an underscore, or something like this.
5 0
3 years ago
There are ____ standard colors for text in a theme.
soldier1979 [14.2K]
In microsoft powerpoint there are 2 or two standard colors for text in a theme. If you use a theme on your presentation, a theme is always equipped with two types of colors for the text, because it gives you more options on what color suits your text and blends with the theme perfectly.
7 0
3 years ago
Other questions:
  • Variable costs are __________.<br><br> A. decreasing<br> B. increasing<br> C. static
    10·1 answer
  • Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin type per l
    7·1 answer
  • What is the very first thing a user usually must do to gain access to a secure computer?
    7·1 answer
  • This diagram shows a number of computing devices connected to the Internet with each line representing a direct connection.
    11·1 answer
  • Green Field county stadium is planning to conduct a cricket match between two teams A and B. A large crowd is expected in the st
    6·1 answer
  • Who is a second-degree contact on a professional networking profile?
    12·1 answer
  • 8.7 Code Practice Question 3
    14·2 answers
  • Drag the right word to it’s definition
    13·1 answer
  • 4.8 code practice question 1 edhesive
    8·2 answers
  • Write code that declares a variable named minutes, which holds minutes worked on a job,
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!