1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
2 years ago
12

What can u access various sites on

Computers and Technology
1 answer:
Klio2033 [76]2 years ago
3 0
Search engines. (I'm Misty btw if you want to know)
You might be interested in
CHALLENGE 7.1.1: Initialize a list. ACTIVITY Initialize the list short.names with strings 'Gus', Bob, and 'Ann'. Sample output f
vlabodo [156]

Answer:

short_names = ["Gus", "Bob", "Ann"]

print(short_names[0])

print(short_names[1])

print(short_names[2])

Explanation:

There are some typos in your code. In addition to the missing part of the code, I corrected the typos.

First of all, initialize the list called short_names. The list starts with "[" and ends with "]". Between those, there are must be the names (Since each name is a string, they must be written between "" and there must be a semicolon between each name)

Then, you can print each name by writing the name of the list and the index of the names between brackets (Index implies the position of the element and it starts with 0)

3 0
3 years ago
A nursing informatics specialist is preparing an in-service program for staff on healthcare informatics and information technolo
Snezhnost [94]

Answer:

A- information

Explanation:

According to my research on nursing informatics specialists, I can say that based on the information provided within the question the nurse would emphasize information as the primary focus. This is because knowing what healthcare informatics entails as well as having the knowledge of how to use the technology is the most important aspect of the job.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
2 years ago
What must you be careful of when retrieving messages/data from mobile devices in public?
pochemuha

We must be careful of when retrieving messages/data from mobile devices in public because of Bluebugging.    It is a form of attack through the use of Bluetooth.  It is more than just Bluesnarling and Bluejacking.  It goes beyond, allowing the thieves to take control of a device.

7 0
3 years ago
In excel, a number can contain the characters__
KATRIN_1 [288]
Comma and period? You can have numbers like 123,456.78
7 0
3 years ago
A ____ attack is much more substantial than a DoS attack because of the use of multiple systems to simultaneously attack a singl
victus00 [196]

Answer: (D) Distributed denial- of- service (DDoS)

Explanation:

The distributed denial of service attack is one of the type of attack that occur when the multiple system are basically flooded with the resources and the bandwidth.

  • Botnet is one of the example of DDoS as it caused the DOS (denial of service) for the users.
  • This type of attack is more substantial as compared to the DoS attack as they use the multiple system for attack the single target simultaneously.

Therefore, Option (D) is correct.

8 0
3 years ago
Other questions:
  • . The toasting cycle of an automatic toaster is started by A. pushing the bread rack down. B. pushing the start button. C. turni
    14·2 answers
  • pWhat macOS system application tracks each block on a volume to determine which blocks are in use and which ones are available t
    14·1 answer
  • What includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology
    7·1 answer
  • A ____ is an image designed to enhance a presentation (such as an electronic slide show or a printed report visually, typically
    15·1 answer
  • In symmetric key cryptosystem, assume that Alice and Bob have set up a common key Kab. This key is only known to Alice and Bob.
    12·1 answer
  • When an item in a menu is black, it means that _____.
    6·2 answers
  • In a flashdisk wich icon can you use to open files in computer​
    5·1 answer
  • If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role shou
    10·1 answer
  • Which very high-speed fiber network was already in place and being used for wide area networking (wan) transmissions, before the
    15·1 answer
  • Answer the following question in 3-4 complete sentences. Define the following terms: - registration - press - keyblock.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!