1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rasek [7]
4 years ago
12

Can you believe everything you read online?

Computers and Technology
2 answers:
Tasya [4]4 years ago
8 0

Answer:

no

Explanation:

bcoz some time it can be a rumour

Maurinko [17]4 years ago
5 0

Answer:

no hope some things will be fake dude

You might be interested in
On March 2, 2022, is birthday wish me a happy birthday
mash [69]

Answer:

happy early birthday hope you have a great day

6 0
3 years ago
Read 2 more answers
What is also known as a visual aid in a presentation?
kap26 [50]

Answer:

Option D i.e., slide are the correct option.

Explanation:

The following option is true because in the PowerPoint presentation slide is the visual aid. With the help of the visual aid, the user can add the acumen to its PowerPoint presentation and it is the item in which the user can summarize their information and data that is slide. It is important for the creation of the official or the business purpose presentation.

3 0
4 years ago
Read 2 more answers
Can some please help me learn how to make a program via Binary Code?
padilas [110]
Look up binary code dictionary it will help you learn codes in letter of binary
8 0
4 years ago
¿en minimo cuantos computadores se puede construir una red,y en maximos en cuanto y que se necesita para que este en la red?​
stira [4]

Answer:

me no speak taco bell

Explanation:

3 0
3 years ago
A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered f
drek231 [11]

Answer:D)Format string attack

Explanation:

Format string attack is the type of attack that causes to change the application functioning .This attack access the memory of the string library. It occurs while the submission of the string as input and then gets tested due to application command.

Other options are incorrect because these are the attacks that don't happens in the application for the alteration of the flow. Thus, the correct option is option(D).

8 0
4 years ago
Other questions:
  • The path to the distribution share should always be referred to by the ____ path to ensure that it can be accessed over the netw
    6·1 answer
  • Special characters that display on the screen but do not print are called _____________
    15·1 answer
  • What is a digital certificate? Select one: a. It is a means of establishing the validity of an offer from a person, entity, web
    7·1 answer
  • Which of the following is the amount of space available on a screen to display information?
    8·1 answer
  • Apollo Couriers, a company providing international express mail services, has a proactive customer communications team. The prim
    8·1 answer
  • java Consider a class MotorBoat that represents motorboats. A motorboat has attributes for: The capacity of the fuel tank The am
    15·1 answer
  • You need to buy a cable to connect a desktop PC to a router. Which cable should
    13·1 answer
  • A photographer is reading about how to ensure a high-quality photographic print. Which statements convey the best way to ensure
    5·1 answer
  • 1
    13·1 answer
  • Find different between manocots and dicots clarify with example​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!