1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ycow [4]
3 years ago
9

A mutation is _____.

Computers and Technology
1 answer:
Kipish [7]3 years ago
8 0

Answer:

I am explain you in image

You might be interested in
Provide an example of a closed‐end credit account that Caroline has.
Usimov [2.4K]

<u>Explanation:</u>

Closed end credit is a loan for a stated amount that must be repaid in full by a certain date. Closed end credit has a set payment amount every month.The government and banks can limit the interest rates and fees that credit card companies can impose.


<u>Example:</u>

An example of closed end credit is a car loan.

5 0
3 years ago
You have used loops for repetitive processes.
zzz [600]

Answer:

for

Explanation:

because:

  • IF = conditional
  • WHILE = conditional
  • DO = isn't a loop function
5 0
3 years ago
You begin your first day of responsibilities by examining the recent IS security breach at GearUp to get ideas for safeguards yo
pentagon [3]

Answer:

Sniffing is the correct answer to the given question .

Explanation:

The main objective of Sniffing is to leads and stealing the information interception by detecting the network activity this activity is done by the Sniffing process .When the information is sent through the networks, the information inside the data packet can be detected  by using a sniffer .The sniffer is used in sniffing process.Information is accessed  by the sniffer because the information packets that are sent in the network  are not secured.

By using the Sniffing technique the hackers hacked the company's improperly-secured wireless network and stole customers ' credit card details as well as employee social security numbers.

6 0
4 years ago
Programmers refer to a sequence of characters as a ____.
jekas [21]
In programming they know it as a String which is  a sequence of characters that are composed of literal constants or some kind of variables. A sting is any finite sequence of characters. every single string has its own lenght and this is one of the most important characteristics of them. Strings are essential to communicate information from the program to the user. 
5 0
3 years ago
Which THREE devices can perform both input and output operations?
Andru [333]

Answer:

nic card,speakers,router

4 0
4 years ago
Read 2 more answers
Other questions:
  • Type the correct answer in the box. Spell all words correctly.
    9·1 answer
  • Which process is used for sending invitations to players to start a game?
    9·2 answers
  • An administrator wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertisemen
    14·1 answer
  • Ryan needs to see the space available to insert content on a slide in his presentation. Which feature of a presentation program
    10·1 answer
  • Kenny needs to keep client information such as names and addresses. She should use a
    7·2 answers
  • Ryan has made a presentation of ten slides, which he wants to display in sequence after a specific time interval. Which element
    5·1 answer
  • I need help converting this to python but i have no idea how to.
    12·1 answer
  • Which statement describes a biotic factor interacting with the environment?
    5·1 answer
  • Accept total number of participants (B) in class. A group of
    12·1 answer
  • How do i delete cookies on a chromebook?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!