1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
egoroff_w [7]
3 years ago
5

What Is an abra file for and what is a emery cloth for?

Computers and Technology
1 answer:
Rainbow [258]3 years ago
5 0
An abra file well it's probably a file in the computer and emery cloth you can look it up on google but it has like a backing. 
You might be interested in
Erica is CEO of a company and has recently hired a vice president of marketing. She would like to share this information with al
EleoNora [17]
B: Send an e-mail to all employees
6 0
4 years ago
Read 2 more answers
Create a list of 5 potential jobs that students of computer science can obtain.
Schach [20]
1. data scientist
2. software engineer
3. product manager
4. web developer
5. software tester
7 0
3 years ago
Read 2 more answers
What are the pros and cons of the internet’s ability to access information
Shkiper50 [21]
THE PRO IS THAT IT ALLOWS PEOPLE TO RESEARCH INFORMATION. THE CON IS THAT PEOPLE ARE ABLE TO DO MEAN THINGS ON THE INTERNET. FOR EXAMPLE, CYBER-BULLYING. PLEASE HIT THE THANKS BUTTON. :)
3 0
3 years ago
Read 2 more answers
I need help please?!!!
PolarNik [594]

Answer:

Turn on the defroster. obv

Explanation:

7 0
3 years ago
Read 2 more answers
A computer supply company is located in a building with three wireless networks.
Sonja [21]

Answer:

A. Rogue access point

Explanation:

A rogue access point is defined as a wireless access point installed on a secure network infrastructure without consent of the owner of the network or without due authorization. While this can sometimes be added by a malicious attacker, it is most commonly set up by employees with the desire to have wireless access even when there is any available.

In the question, there are three wireless networks, but on scanning, five wireless networks were found, hence they are rogue access point.

3 0
3 years ago
Other questions:
  • When doing a complex presentation, which of the following would be the best tool to begin designing your presentation?
    11·2 answers
  • _____ is when network managers deal with network breakdowns and immediate problems instead of performing tasks according to a we
    9·1 answer
  • A type TW cable containing two No. 12 copper conductors has a maximum overcurrent protection of
    7·2 answers
  • Files with what two file extensions are commonly known as tarballs??
    8·1 answer
  • After a suspected identity fraud case has been resolved, you should:
    5·1 answer
  • Sam needs to create a spreadsheet for his coworkers. They will need to follow a crossed a long road of data. Sam would like to m
    15·1 answer
  • What is the "online disinhibition effect"?​
    7·1 answer
  • Today, scientists agree that good research is ethical in nature and is guided by basic respect for human dignity and safety. How
    6·1 answer
  • Which of the following sentences use personification 
    9·1 answer
  • What is a word processing program? Give examples of word processing programs.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!