1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gregori [183]
3 years ago
15

Georgenotfound??? question mark??

Computers and Technology
2 answers:
Arlecino [84]3 years ago
8 0

Answer:

hi

Explanation:

Nezavi [6.7K]3 years ago
3 0
Hehehehehe bye bruh
You might be interested in
An example of computer hardware is ? A. keyboard B. app C. web browser D. operating system
Flura [38]

Answer:

D. Operating system

Explanation:

A keyboard is a secondary item like a mouse and is not apart of computer hardware and app is also not a computer hardware because its coding not hardware. Web Browser is a Internet thing not hardware.

4 0
2 years ago
Read 2 more answers
Pa answer po thank you​
Arturiano [62]

Answer:

1. software (1st row)

2. binary code (6th row)

3. pc language (11th row)

I found these three!!!

4 0
2 years ago
Read 2 more answers
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
KatRina [158]

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

7 0
2 years ago
Full from of tmc computer
Butoxors [25]

Answer:

Traffic Message Channel,

7 0
2 years ago
Read 2 more answers
Double bar graphs compare multiple what
GalinKa [24]
You would multiply by 2
7 0
3 years ago
Other questions:
  • What does bam file stand for computer terms?
    9·1 answer
  • Which cloud computing service model will enable an application developer to develop, manage, and test their applications without
    15·1 answer
  • A collection of information stored in an electronic format that can be searched by a computer.
    14·1 answer
  • A server that provides data transfer and storage space at remote locations is called a
    7·1 answer
  • Which of the following is NOT true about RMI? RMI uses the socket connection, including opening and closing the socket. RMI allo
    8·1 answer
  • A(n) ______ system is a set of programs that coordinates all the activities among computer or mobile device hardware. a. managem
    10·1 answer
  • Splunk knows where to break the event, where the time stamp is located and how to automatically create field value pairs using t
    7·1 answer
  • How many characters does the "short text" have?
    9·1 answer
  • You are asked to check your company’s configurations to determine if any filters should be built to stop certain ICMPv6 traffic.
    9·1 answer
  • You want to draw a rectangle over the moon you added to your slide and then move it behind the moon. You want it to look like a
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!