1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sunny_sXe [5.5K]
3 years ago
8

Help PLEASE (in attachment)

Computers and Technology
1 answer:
bekas [8.4K]3 years ago
7 0
Oxygen, Glucose, Chemical Energy

ACB I think ( not giving my word on this part)

They are essential to all ecosystems
You might be interested in
Which three pieces of information should be included in an artist statement? Select all that apply.
Dima020 [189]

Answer:

There is no answers given??

Explanation:

N/A

4 0
2 years ago
"Different links can transmit data at different rates, with the _______ of a link measured in bits/second"
murzikaleks [220]

Answer: Transmission rate

Explanation:

 Transmission rate is measured in bits per second and it transmitted the data at the different rate across the circuit. The speed in which the data rate is transferred from one device to anther is known as transmission rate.

The transmission rate are always less as compared to signalling rate because the signalling rate contain the total data which basically include the overhead to control the information.

Therefore, transmission rate is the correct option.

 

7 0
3 years ago
What is the difference, if any, between secure HTTP and firewalls?
Jobisdone [24]

Answer:

SSL would simply encrypt whatever request is sent to the server. In order to prevent the execution of such malicious scripts/payloads at the Web application (in other words the Web server), a Web Application Firewall is implemented in place. ... Whereas, HTTPS where SSL comes into picture would have methods such as POST.

in other words its A

5 0
3 years ago
Which file extension indicates a text document? .ppt .tst .pdf .txt
Ber [7]

Answer:

The answer is .txt

Explanation:

6 0
2 years ago
Read 2 more answers
A key step in the ____ approach to incident response is to discover the identify of the intruder while documenting his or her ac
muminat

Answer:d)apprehend and prosecute

Explanation: A intruder is a person who tries to access the system or damage it in an unauthorized manner. The person who is found with any intruding activity should be discovered.

Apprehending means of getting aware and prosecute defines the accusing of any person committing a crime .These activities define the nature of the intruder whose trying to commit the crime and should be detected while he  is pursuing the activity.Thus , the correct option is option(d).

7 0
3 years ago
Other questions:
  • What is the main purpose of cutting plane line arrows?
    7·1 answer
  • If you wanted to include a chart in the new slide you are getting ready to create, you would most likely
    9·1 answer
  • Interruption attacks are also called ___ attacks:
    8·1 answer
  • This is the term for the manual process of editing strips of the film before digital editing was created. The term is still used
    9·1 answer
  • Activity
    7·1 answer
  • For each of the descriptions below, perform the following tasks:
    11·1 answer
  • What are benefits of virtualizing servers ?
    5·1 answer
  • Anyone trying to play fortnite ? im bored lol
    6·2 answers
  • In which of the following stages of the development process is a team MOST likely to interview a potential user of an app?
    6·1 answer
  • Explain why agile methods may not work well in organizations that have teams with a wide range of skills and abilities and well-
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!