1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natima [27]
3 years ago
13

Does anyone want to play 2k21 or rocket league on xbox my username is Bud zecaog

Computers and Technology
2 answers:
hichkok12 [17]3 years ago
8 0
Bet some 2k you already know
blsea [12.9K]3 years ago
3 0

Answer:

i haven't got it

Explanation:

sorry very much dude sorry

You might be interested in
Name the following hardware device to write the data from hard disk to CD ​
lys-0071 [83]

Answer:

CD Writer or DVD Writer

Explanation:

The DVD Writer/CD Writer is a multipurpose rewriteable drive that can read audio, data, and video files and can record, or write, in both CD and DVD formats. This DVD Writer/CD Writer drive enables you to: Create custom audio, data, and video files that can be recorded onto CDs or DVDs. Store large amounts of data.

7 0
4 years ago
What type of malicious computer programs present themselves as useful computer programs or applications?
erastova [34]

Answer:

The correct answer to the following question will be "Trojan programs".

Explanation:

  • A trojan is a kind of software often identified as legal applications. Internet-thieves and hackers will hire Trojans and they were trying to access to consumer programs. Users are usually fooled into launching and operating Trojans on their devices by a certain form of economic manipulation.
  • It's a kind of malicious software that express themselves as helpful applications and programs.

Therefore, the Trojan program is the right answer.

5 0
3 years ago
Read 2 more answers
Which account type is require to join the computer to the domain?
yulyashka [42]

Answer:

the computer must have an account in the domain which, like a user account, includes a logon name (sAMAccountName), a password, and a security identifier (SID) that uniquely represent the computer as a security principal in the domain.

Explanation:

-Hailey:

4 0
3 years ago
Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?
Sloan [31]

Answer:

The last one

Explanation I think it is D because all of the other answers are saying what happen if you filter it.

3 0
3 years ago
Read 2 more answers
Suppose that Alice wants to send Bob a 50 kilobyte message over a 1 Gbps link. The total time required to transmit the message (
svlad2 [7]

Answer:

170 Mbps

Explanation:

Time taken to put data on to the link T1 = 50kB / 1 Gbps = 0.0004096

Time taken for transmission T2 = 2 milliseconds = 2 * 10-3

--> throughput = ( 1 / (1+T2/T1) ) * bandwidth of link

= ( 1 / (1 + 4.8828125) ) * 1 Gbps

= 0.16998672 * 1 Gbps

= 169.98672 Mbps

= 170 Mbps.

8 0
3 years ago
Other questions:
  • A short-circuit evaluation is where each part of an expression is evaluated only as far as necessary to determine whether the en
    14·1 answer
  • You type. The word "weather" when you ment "whether" when will the writer or word flag this as a misspelling or a grammar proble
    13·1 answer
  • A broadcast network is one in which a transmission from any one attached station is received by all other attached stations over
    10·1 answer
  • If it is impractical to place guest users in a secure network, isolated from the production network by firewall barriers, then:
    14·1 answer
  • Simone frequently downloads mobile apps from Amazon Appstore. What operating system does she have on her smartphone?
    6·1 answer
  • Most software packages have functions for generating _____ about columns of data, which include statistical summaries like contr
    7·1 answer
  • Classify the following skills: communication, creativity, and independence.
    15·1 answer
  • I have been trying for 2 days to make an account, but it says registration cannot be completed at this time. It is extremely ann
    12·2 answers
  • Six security issues and six descriptions are shown below.
    11·1 answer
  • Why do we use computers?<br><br>​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!