1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldenfox [79]
3 years ago
14

HELP PLEASE ASAP brainliest to accurate

Computers and Technology
2 answers:
Svet_ta [14]3 years ago
3 0
A patent law

Patent laws deal with new inventions and relays to the owner’s exclusive right to the claimed invention. It is a right that should be granted by the government to an inventor, to exclude others from using, making, importing, or selling an invention. In this case, Jenna's secret, unique recipe is her patent.


jeyben [28]3 years ago
3 0

The answer is D.  patent

You might be interested in
Which layer of the osi model is mainly concerned with routing packets of data from one network card to another across a large ne
horrorfan [7]
Layer 3 the Network Layer
7 0
3 years ago
Which type of firewall automatically adjusts its filtering rules based on the content of the traffic of existing sessions?
vaieri [72.5K]

Answer: Dynamic packet filtering

Explanation:

Dynamic packet filtering is the type of fire wall which is used automatically to enabled the modification in the real time based on the traffic content according to the filtering rules.

The dynamic packet filtering also facilitates to monitor the actual state of connection which is active.

It is also used to determine the actual state of network packet and permits the packet of network pass through firewall.

7 0
4 years ago
What are the functions of an input device​
marshall27 [118]

Answer:

To feed the computer with data/instructions

6 0
3 years ago
Read 2 more answers
Using the Vigenere cipher, does the length of the key matter?
Dafna1 [17]
Yes, the longer the Key the harder the encryption i believe
6 0
4 years ago
(true or false) fortnite is the best?
GarryVolchara [31]

Answer:

FALSE ZzZzZzZz

Explanation:

Cus it is PERIOT

7 0
3 years ago
Read 2 more answers
Other questions:
  • Algorithm for converting decimal into binary.
    7·1 answer
  • If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp
    11·1 answer
  • A technician suspects a network card is not working. Which tool should the technician use to test the network card?
    14·1 answer
  • Why are computers assigned IP addresses
    15·1 answer
  • What kind of a bug is 404 page not found
    10·2 answers
  • Careers in information technology deal with
    12·2 answers
  • is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
    6·1 answer
  • Select the correct answer
    15·1 answer
  • When you use transact-sql, you can store procedural code in:
    14·1 answer
  • write the few lines of code that prompts the user to enter a series of exam scores, stopping when the user has entered an exam s
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!