1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kruka [31]
4 years ago
8

Select the correct answer.

Computers and Technology
2 answers:
DochEvi [55]4 years ago
5 0
The answer is a illustrator
Aloiza [94]4 years ago
3 0
A. Illustrator would be the anwser
You might be interested in
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
allochka39001 [22]

Answer:

hybrid

Explanation:

A hybrid attack is a blend of both a dictionary attack method as well as brute force attack. This means that while a dictionary attack method would include a wordlist of passwords, the brute-force attack would be applied to each possible password in that list.

7 0
3 years ago
What software can be used for remote operation of a sunsdr2 dx?.
Rasek [7]

Answer:

Install the ExpertSDR2 Remote Client software on your PC. Download the client here. You can also access your device via any web browser

8 0
2 years ago
Similarities of ROM and RAM?​
lesantik [10]

Explanation:

both are primary storage devices

4 0
3 years ago
17. Which of the following is not a visible section in a File Explorer window?
andrew-mc [135]

Answer: D.)

Explanation: Clipboard

4 0
3 years ago
A wireless networking technician has completed a survey of a wireless network and documented the detected signal strengths in va
katrin [286]

Answer:

Heat Map

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the document being described is known as a Heat Map. This shows the signal strengths of wireless networks in different locations, and are used to fix networking problems as well as improve performance.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

4 0
3 years ago
Other questions:
  • Why do computers need to periodically check the dns for websites you have already visited? enter your answer here?
    15·1 answer
  • You have been tasked with finding the routers that have been installed between two networks. what utility would you use to provi
    5·1 answer
  • Consider the partially-filled array named a. What does the following loop do? (cin is a Scanner object)
    12·1 answer
  • Suppose the length of each packet is L bits. Also, assume the path from a server to a client includes N links each of rate R (i.
    8·1 answer
  • An alteration threat violates information integrity. <br> a. True <br> b. False
    13·1 answer
  • The valence electron configurations of several atoms are shown. how many bonds can each atom make without hybridization? 2s^2 2p
    12·1 answer
  • What goals do you set for yourself while studying?
    9·2 answers
  • Team members can collaborate on ideas using telepresence. <br> true or false?
    10·1 answer
  • PLEASE HELP!!!
    8·1 answer
  • Which shortcut keys can be used to duplicate a slide?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!