1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoray [572]
3 years ago
11

Can yahll help me here on this

Computers and Technology
1 answer:
Murrr4er [49]3 years ago
4 0

Answer:

b

Explanation:

You might be interested in
Which command provides the source refrence at the bottom of the current page of a document?
DENIUS [597]

Answer:

Footnote

Explanation:

The notes related to citation or reference or comment that is assigned to a text on that page is called footnote.

3 0
3 years ago
Complete the following sentences with the correct form of the verbs in brackets.
Rina8888 [55]

Answer:

1. don't pass, will be

2. will get, eat

3. don't help, won't help

4. are meeting, will you go?

5. will stay, rains

Is

6.Will

Puts on

7.Will go

Asks

8.Will... tell

9.Tell

Will

10.Go... Will find out...

Explanation:

5 0
3 years ago
In what century was plastic invented ?​
Angelina_Jolie [31]

in the year 1907 plastic was invented

5 0
3 years ago
A ____ attack is much more substantial than a DoS attack because of the use of multiple systems to simultaneously attack a singl
victus00 [196]

Answer: (D) Distributed denial- of- service (DDoS)

Explanation:

The distributed denial of service attack is one of the type of attack that occur when the multiple system are basically flooded with the resources and the bandwidth.

  • Botnet is one of the example of DDoS as it caused the DOS (denial of service) for the users.
  • This type of attack is more substantial as compared to the DoS attack as they use the multiple system for attack the single target simultaneously.

Therefore, Option (D) is correct.

8 0
3 years ago
Which of the following is the most compelling
Gemiola [76]
To compare data makes the most sense
5 0
3 years ago
Read 2 more answers
Other questions:
  • Demonstrate your grasp of the Unix file system by constructing a directory structure as follows: In your home ( ~ ) directory, c
    11·1 answer
  • The condition, ____, entered in the criteria row of a long text field in a query window would retrieve all records where the lon
    8·1 answer
  • In an ha configuration, which two failure detection methods rely on icmp ping? (choose two.)
    12·1 answer
  • There are about what licensed drivers here in Florida
    7·1 answer
  • A computer’s BIOS is defined as the
    12·2 answers
  • Is full dive vr possible and can we accomplish it with today’s technology? Explain why
    13·2 answers
  • When you are almost done with your soup and want to get at the last little bit, how should you do this 2
    5·1 answer
  • PrimeFactorization.java: Write a program that begins by reading in a series of positive integers on a single line of input and t
    12·1 answer
  • Choose and explain, step by step, one method of backing up student files either manually or using a cloud service.
    10·1 answer
  • The ___ function can be entered by clicking the cell where you want to add the funtion such as cell J6. Then click the arrow nex
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!