1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UkoKoshka [18]
3 years ago
10

Fill in the blank with the correct response.

Computers and Technology
1 answer:
Serga [27]3 years ago
6 0

Answer:

jargon

Explanation:

You might be interested in
Which would be a responsible use of technology used by victims of cyberbullying?
IrinaVladis [17]

Answer:

Changing password and screen names regularly.

Explanation:

The cyber attacks have been common in this age. The technological advancements have eased our lives but also create hundreds of risks. These risks can include cyber bullying. The best way to keep your self away from being victim of such threat is by changing passwords regularly. This reduces the chance of hacking passwords and cyber bullying.

5 0
3 years ago
Read 2 more answers
What CLI command can be issued in CentOS 7 to help you to see every "hop" that a connection makes, including all of the switches
aleksklad [387]

Answer:

traceroute

Explanation:

This command traceroute implies its name, in networking, it is of interest sometimes to know the path a packet takes and how much time it uses between two nodes (PC). Using this command, will display the path that the packet follows when it is sent from one computer until it reaches the specified host (destination) , it reveals the entire routes and the hops the information packet makes on every switch, router and firewall and how much time it spent on each device along the way.

5 0
4 years ago
The illustration shows different types of text language.
Dvinal [7]

nawww dude im good look it up

7 0
3 years ago
Read 2 more answers
Plagiarism is considered
skad [1K]

Answer:

cheating

Explanation:

6 0
3 years ago
Which of the following scenarios might indicate that you have been a victim of identity theft?A)Your credit report displays acco
victus00 [196]

Answer:

Option A is the correct answer for the above question.

Explanation:

A Victim is a person, who faces the problem of a criminal person. Here in the question, the scenario is that a user is a victim of the identity of being theft by some other person. So the user can get known by the help of option a, which suggests that the user's credit card report display something which is not done by him then it can be the scenario, where the user can understand that he is a victim. hence option a is the correct answer where the other option is not because--

  • Option B suggests the user does not pay the bill on time but it is a general case because the bill is paid by the user is in every month not a single time.
  • Option C suggests both options (A and B) are correct, but option b is not the correct.
  • Option D suggests that no option is valid from the above but option A is the correct.
7 0
3 years ago
Other questions:
  • A student is reading a book for language arts. She has to finish three chapters by class tomorrow, because there will be a quiz.
    6·2 answers
  • Rina has misspelled a word many times in her document. Which is the fastest way she can correct the mistake?
    11·1 answer
  • What is the basic unit for storing data in exel
    13·1 answer
  • When you start to type =av, what feature displays a list of functions and defined names?
    11·1 answer
  • Which of the following is a school-to-work program that provides the student with paid employment, school credit, and school gra
    7·2 answers
  • Hey, anyone like will u jus help meh like pleaseee
    14·2 answers
  • Write a program that teaches arithmetic to a young child. The program tests addition and subtraction. In level 1, it tests only
    11·1 answer
  • Write a pseudocode to print the sum of first 10 terms in the series: <br> 2, 4, 9, 16, 25…
    5·1 answer
  • So has anyone opened the link/file those people are giving out as answers? Like what are they, viruses, answers, nothing??? Some
    9·2 answers
  • Which type of service offers a preconfigured testing environment for application developers to create new software applications?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!