1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crazy boy [7]
3 years ago
9

HURRY UP NEED HELP!!! What are examples of curricular education? Check all that apply.

Computers and Technology
2 answers:
PolarNik [594]3 years ago
6 0
An engineering class
a history class
a CTSO
kolezko [41]3 years ago
4 0

Answer:

an engineering class

a history class

a school reading program

Explanation:

Just did on Edge

You might be interested in
What are the sectors of the buisness enviornment
Alinara [238K]

Answer:

The external business environment consists of economic, political and legal, demographic, social, competitive, global, and technological sectors.

4 0
2 years ago
Jackson has completed remediation of a virus-infected system. He eliminated all the startup program issues and uninstalled sever
nadezda [96]

Answer:

C. Recover the user data.

Explanation:

Because a virus delete user data

8 0
3 years ago
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
OLEGan [10]

Answer: Stealth scanning technique

Explanation:

Stealth Scanning technique includes the following steps:

1. The client upon sending a single SYN packet to is responded by SYN/ACK packet if the port is open.

2. The port is assumed to be in closed state if the RST packe t is sent from the server.

3. This RST packet is sent by the client to close the initiation process so that a connection cannot be established.

6 0
3 years ago
Given the availability of an ifstream object named input, write the other statements necessary to read an integer into a variabl
tatiyna

Answer:

input.open("rawdata");

input>>datum;

input.close();

Explanation:

ifstream objects maintain a filebuf object as their internal stream buffer, and perform operations like input/output on the available associated files.

In above statements.

                            input.open("rawdata");

  • The associated file named rawdata is opened.

                            input>>datum;

  • The integer from the file is read into already declared variable datum.

                             input.close();

  • Input stream is closed.
4 0
3 years ago
Look at the following Python code:
aliya0001 [1]

Ump will be assigned to word2

word1[0:3] gets all of the letters from index 0 to index 3 exclusive (that means index 3 is not included)

4 0
3 years ago
Other questions:
  • Where is the insert function button found in microsoft excel?
    11·1 answer
  • You can apply bold, italic, and underline styles to text. But why is it a good idea to use underline sparingly?
    13·2 answers
  • Basic rule for java languague
    13·2 answers
  • Instructions:Select the correct answer.
    8·2 answers
  • Why do some people think the global<br> economy is good for the United States?
    10·1 answer
  • For each 8-bit data frame the layer uses a generator polynomial G(x) = x4+x2+ x+1 to add redundant bits. What is the sequence of
    11·1 answer
  • Ted knows that macros can be helpful to him in his work with Excel spreadsheets,but he also knows they have their hazards,so he
    15·1 answer
  • When approaching a bicyclist from the rear, you should slow down and
    8·1 answer
  • he degree of operating leverage is equal to: Group of answer choices FC / OCF. VC / OCF. 1 FC / OCF. 1 VC / OCF. 1 Picture FC /
    9·1 answer
  • What is a trojan horse
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!