1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amm1812
3 years ago
9

25 points!!!!!!!!!!!!!!!!!!!!!

Computers and Technology
2 answers:
guajiro [1.7K]3 years ago
5 0

you too!! youre awesome!!

Wittaler [7]3 years ago
4 0

Answer:

thank u appreciate it

Explanation:

You might be interested in
An important result of the development of anesthesia was?
Ksju [112]
It could be #2 since the patient would be asleep under the anesthesia they would be able to perform amputations more often since the patient would not be able to feel the pain during the procedure. It could also be #3 because if the patient is asleep you could use a more direct approach instead of avoiding certain procedures that would put the patient in a lot of pain if it was performed while they were awake. In all I would say the answer is #2, please comment which is the right answer, thank you.
7 0
4 years ago
Why are medical coders using encoded software
EastWind [94]
To keep the medical records confidential otherwise, hackers would take advantage of them and sell them to the highest bidder 
3 0
3 years ago
A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused
sweet [91]

Answer:

a. True

Explanation:

The statement that a pen testing method or penetration test in which a tester who has a means of entry to an application behind its firewall imitates an attack that could be caused by a malicious insider.

A penetration test, which is also refer to as a pen test, pentest or ethical hacking, is an approved simulated cyberattack done on a computer system, performed in order to evaluate the security of the system. The test is carried out to identify both weaknesses or vulnerabilities including the potential for unauthorized parties to penetrate to the system's features and data.

The main purpose of performing this test is to identify any vulnerability in a system's defenses which attackers may take advantage of.

6 0
3 years ago
How much do you think it would cost to develop an app?
netineya [11]

It really depends on the type of app. There are lots of free pieces of software but distribution is expensive.

Android - $20 one  time fee

IOS - $99 per year

5 0
3 years ago
Read 2 more answers
Why do meteorologists use data such as temperature, wind speed, and air
Tresset [83]

Answer:

b

Explanation:

3 0
3 years ago
Other questions:
  • Which is NOT a reason to study science?
    13·1 answer
  • Algorithm for converting decimal into binary.
    7·1 answer
  • Write a C++ program that overloads a function named LinearSearch that searches an array of data of either integer data type, flo
    8·1 answer
  • Which type of evidence should victims collect to help officials catch cyber bullies
    9·2 answers
  • Which tasks can be completed using the Chart Tools Design tab? Check all that apply.
    9·1 answer
  • The __________ utility has the capability to manage users, create and administer user groups, and apply user rights to those use
    8·1 answer
  • Kathi, the owner of Klothes for Kats, is excited about the launch of her first Local Catalog ad. She remembers there are a few d
    6·1 answer
  • ELO 3.6 Which type of iSCSI name requires a registered domain name to generate a unique iSCSI identifier?
    12·1 answer
  • Prepare algorithm and draw a corresponding flowchart to compute the mean value of all odd numbers between 1 and 100 inclusive.​
    10·1 answer
  • A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!