1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena-2011 [213]
3 years ago
14

What is composition

Computers and Technology
1 answer:
damaskus [11]3 years ago
5 0
<span>the nature of something's ingredients or constituents; the way in which a whole or mixture is made up.</span>
You might be interested in
Why is color important for all objects drawn ?​
Sati [7]
Technically, drawing in colored pencil is simply layering semitransparent colors on paper to create vivid paintings. Every color has three qualities
7 0
3 years ago
Mention two hardware groups​
mars1129 [50]

Answer:

input Devices, Processing Devices, Output Devices, Memory/Storage Devices

Explanation:

4 0
3 years ago
You begin your first day of responsibilities by examining the recent IS security breach at GearUp to get ideas for safeguards yo
pentagon [3]

Answer:

Sniffing is the correct answer to the given question .

Explanation:

The main objective of Sniffing is to leads and stealing the information interception by detecting the network activity this activity is done by the Sniffing process .When the information is sent through the networks, the information inside the data packet can be detected  by using a sniffer .The sniffer is used in sniffing process.Information is accessed  by the sniffer because the information packets that are sent in the network  are not secured.

By using the Sniffing technique the hackers hacked the company's improperly-secured wireless network and stole customers ' credit card details as well as employee social security numbers.

6 0
4 years ago
Help it’s an exam brainleist
andreyandreev [35.5K]

Explanation:

Automatic transaction machine

False

True

8 0
4 years ago
Imagine a situation where two developers are simultaneously modifying three different software components. what difficulties mig
lbvjy [14]
A main problem that may arise is if they have created two different ways of adressing the same part of the software
4 0
3 years ago
Other questions:
  • Which of the following would indicate that a website is a secure site?
    7·2 answers
  • Application partitioning gives developers the opportunity to write application code that can later be placed on either a client
    7·1 answer
  • What is "social
    13·2 answers
  • Which of the following functions sends the the GPA entered by the user to the calling function? A. def get_gpa(): gpa = float(in
    8·1 answer
  • Before using large downloaded files that are in a compressed format, it is necessary to_____ them. A) Copy B) Extract C) Open D)
    9·1 answer
  • Anyone Free to Talk??????? I'm Bored :(
    6·2 answers
  • What should you do before using a website to store student information ? A. Read and understand the website’s privacy contract
    11·2 answers
  • Selective colleges choose to have in-person meetings to learn more about the applicants. These meetings are called:
    8·2 answers
  • How can a user remove or delete a Pivot Table?
    8·1 answer
  • What is the total running time of counting from 1 to n in binary if the time needed to add 1 to the current number i is proporti
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!