1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
choli [55]
2 years ago
6

Our new catalog contains an eclectic collection of items

Computers and Technology
1 answer:
Cloud [144]2 years ago
7 0

Answer: .

Explanation: .

You might be interested in
true or false: if a comment is posted anonymously, it cannot be considered hate speech or cyber bullying
pickupchik [31]

Answer:

false

Explanation:

Think about it

5 0
2 years ago
Read 2 more answers
Beth would like to eavesdrop on network traffic resulting from users browsing the Web. Which port would provide her with the mos
Elis [28]

Answer:

port 80

Explanation:

port 80 is http. port 443 is https. so if you are trying to be a sneaky little person and eavesdrop on people, eavesdrop on port 80 not port 443 because port 80 is unsecured plaintext data transmission over websites

7 0
2 years ago
A digital certificate confirms that the macro created by the signer has not been altered since the digital certificate was creat
Nesterboy [21]

Answer: False

Explanation:

Digital certificate is defined as entity identification in digital form that is used by a user or firms to share their information along with authentication and security. It uses public key cryptographic technique and so it is also know as public key certificate.

  • Digital signature is the signature that is done digitally to secure data or document.It maintains security of the content present  in message of information that is being exchanged through e-signature.It follows encryption technique for maintaining authenticity.
  • Therefore, digital signature is the signing feature that protects macro after being made to maintain its authenticity.
  • Thus, the given statement is false.
3 0
2 years ago
What type of thinking work does the computer need to do to solve the problem?
poizon [28]

Answer:

<h3>Computational Thinking is the thought processes involved in formulating a problem and expressing its solution in a way that a computer—human or machine—can effectively carry out.</h3>

Pa brainliest po

3 0
2 years ago
Match the protocols to their use. HTTP POP3 SMTP FTP You check email in your inbox. arrowRight You send an email to a friend. ar
emmainna [20.7K]

Answer:

HTTP stands for "Hyper Text Transfer Protocol" and is used for transferring readable documents across the internet. This matches the action "You visit a website"

POP3  stands for "Post Office Protocol 3" and is used for reading e-mail.  This matches to the action "You check email in your inbox"

SMTP stands for "Simple Mail Transfer Protocol", and is used for sending email.  This matches the action "You send an email to a friend".

FTP stands for "File Transfer Protocol", and is used for transferring files to and from other machines.  This matches the action "You transfer a text document", although truthfully that description is so vague it actually matches all four of the given protocols.

3 0
2 years ago
Other questions:
  • Image files are grouped into two categories: _____.
    5·1 answer
  • PLZ HELP ME! What is a false statement about online time?
    9·1 answer
  • What is x squared times b squared
    8·1 answer
  • Optimal page replacement ______.A. is the page-replacement algorithm most often implementedB. is used mostly for comparison with
    12·1 answer
  • The acronym pies is used to describe improvised explosive devices (ied) components. pies stands for:
    13·2 answers
  • The most commnonly used OS is ___.<br> MS-DOS<br> Windows<br> Mac<br> Linux
    8·1 answer
  • What is the purpose of creating a primary key in a database
    14·1 answer
  • Implement the Tollable interface. It provides one method, pay, that accepts an int (how many dollars to pay), and returns an int
    8·1 answer
  • Write two sentences but each one having either computer in it or technology in it. You can use a word more than once in a senten
    7·2 answers
  • Pa answer po thank you​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!