1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SpyIntel [72]
3 years ago
13

Tfuuvj vjiibjoon Ghosh kpj

Computers and Technology
2 answers:
Nookie1986 [14]3 years ago
5 0

Answer: A

Explanation: For any formal document you need your major points.

Flura [38]3 years ago
5 0

Answer:

Your answer is A. Hope this helps!

You might be interested in
_____ are software systems designed to support interoperable machine-to-machine interaction over a network.
BlackZzzverrR [31]

Answer:

A Web service

Explanation:

A Web service is a software system designed to support interoperable machine-to-machine interaction over a network. It has an interface described in a machine-processable format

8 0
2 years ago
What is the best thing about Tuesday’s in general? Why?
Stolb23 [73]

Answer:

tbh I really don't know what you mean

4 0
3 years ago
How many threads can a quad-core processor handle at once?
Hoochie [10]
It can handle 8 threads at once.
4 0
3 years ago
A(n) _____ uses spatial and nonspatial data and specialized techniques for storing coordinates of networks of lines (roads, rive
scoray [572]

Answer:

A geographic information system (GIS) uses spatial and nonspatial data and specialized techniques for storing coordinates of networks of lines (roads, rivers, streets) and reporting zones (zip codes, cities, counties, states).

4 0
3 years ago
In ________, an attacker accesses the network, intercepts data from it, and even uses network services and/or sends attack instr
xxMikexx [17]
The answer is:  "drive-by hacking" .
____________________________________________
 
      "In<span> <u> drive-by hacking </u></span>, <span>an attacker accesses the network, intercepts data from it, and even uses network services and/or sends attack instructions to it without having to enter the home, office, or organization that owns the network."
_______________________________________________________________</span>
5 0
3 years ago
Other questions:
  • A web page that integrates content and scripts from multiple web sites to create new applications is known as a:
    13·1 answer
  • When microsoft released word for windows, wordperfect had about 80 percent of the word processing market. microsoft donated free
    6·1 answer
  • QUESTION: Which is not an example of a video port or cable?
    10·1 answer
  • Hello everyone. I need help. C programming. Create at least two more functions except the main () function to collect them.
    5·1 answer
  • A server technician has been tasked with purchasing cables and connectors for a new server room. The server room consists of one
    15·1 answer
  • Select three physical forms of storage. USB drive Primary cache Magnetic storage Secondary cache Dynamic RAM Optical drive
    7·2 answers
  • Viktor has climbed a tall tree to get a good view of the giraffes on the savannah. He is snapping lots of photographs of the gir
    8·1 answer
  • A user logs on to a laptop and opens her email. What device will provide emails to the laptop?
    13·1 answer
  • You have a passage of text that needs to be typed out, but some of the letter keys on your keyboard are broken! You're given an
    14·1 answer
  • When you create a user with the useradd command, what is the immediate state of it?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!