1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Burka [1]
3 years ago
8

Upon looking out at the

Computers and Technology
2 answers:
qwelly [4]3 years ago
8 0
Yes? Please complete ur question dude...
slava [35]3 years ago
8 0
Very interesting... like a story book..
You might be interested in
How is a transaction verified on a cryptocurrency network?.
Agata [3.3K]

Answer:

By being a part of a block to a block chain and each block in the block chain is precisely connected to the block that was before it.

Explanation:

I Hope This Helps You

6 0
2 years ago
How can you protect your information when using wireless technology
Mnenie [13.5K]

Answer: Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

Explanation:

8 0
2 years ago
Examples of domain names and usernames<br><br><br><br>​
svp [43]

Answer:

examples are:

com or .edu is a top-level domain name (TLD)

cornell.edu is a second-level domain name (SLD)

bigred.cornell.edu is a third-level or three-part domain name

project.bigred.cornell.edu is a fourth-level or four-part domain name

hope this helps you.

4 0
3 years ago
A(n) ______ is a type of collaborative website that allows users to create, add, modify, or delete website content.
andrey2020 [161]
<span>A wiki is this type of site. The users can, anonymously or with a profile, add to or delete content already posted. This gives the community the ability to add to the overall knowledge base on a specific subject. The site tracks changes through IP addresses to make sure that changes are not done maliciously.</span>
8 0
3 years ago
Traceroute would be best suited for which of the following tasks?
sleet_krkn [62]
The answer is A, or Locating bottlenecks in a network.
3 0
2 years ago
Other questions:
  • Does anyone have any social media message me
    14·1 answer
  • What type of firestopping technology expands as much as 25 times in volume?
    6·1 answer
  • What is the "host" in a typical email address?
    14·1 answer
  • Which database is more secure: the java-based apache derby or mysql?
    6·1 answer
  • How a computer encodes text, how it is processed and how computer data is represented.
    6·1 answer
  • Normal wear and road conditions can take their toll on a car’s steering and suspension system, altering __________. A. wheel ali
    15·2 answers
  • Which type of computer is the best? laptop, tablet, or desktop
    15·2 answers
  • In the __________ Standard, chemical manufacturers, importers, and distributors are required to provide hazard information by wa
    10·1 answer
  • This is pixlr
    6·1 answer
  • An IT department receives a shipment of 20 new computers, and Alice has been assigned the task of preparing them for deployment
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!