1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrMuchimi
3 years ago
7

What are some cowboy ethics??

Computers and Technology
1 answer:
lys-0071 [83]3 years ago
4 0

Answer:

giv meh a min plsssss

Explanation:

You might be interested in
can you give me a tip to fix my SIM card becuaus when i put it on my phone it has no signal , can anyone fix this , thank you.​
Korvikt [17]
I think you broke the SIM out of the big SIM card that was attached to it because some phones need that to fit or maybe your inserting it upside down.
4 0
3 years ago
Read 2 more answers
The purpose of an experiment is often based on ? A. new theories B. observations C. opinions of famous scientists D. beliefs of
ioda
B
Observation
Experiments are based on observations because it can help you determine or visualize many thing

6 0
3 years ago
____________ is a series of numbers that identifies a particular computer. They may or may not be a reliable way to link you to
Valentin [98]

Answer:

An IP Address

Explanation:

Every computer or networking device has its own IP address. It is a series of numbers that will uniquely identify a particular computer on the internet. Since the computer connects to the internet via a router (provided by the Internet Service Provider), it is the router's IP address (or simply the network address) that is shared on the internet. So, the IP address is not exactly a reliable way of linking you to what you do on a computer.

<em>Hope this helps!</em>

6 0
3 years ago
Website hosting servers have their own unique IP address, what does this address consist of?
Alchen [17]
A. Numbers and letters
4 0
3 years ago
Computer ForensicsThere are many differences between public-sector and private-sector computer investigations. What do you see a
elena55 [62]

Answer:

For a private computer investigation into cyber crime the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

Explanation:

Computer forensics are used to resolve crimes like cyber crime, hacking, malfunctions and data interrupts.

Before a private computer investigations which is into cyber crime investigation can continue, the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's and the personnel's are not necessarily supposed to complete the courses

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

5 0
4 years ago
Other questions:
  • Need help with this file and due today!!
    6·1 answer
  • Which of the following can be used to visually represent information similar to diagrams?
    6·2 answers
  • In a @return tag statement the description:
    13·2 answers
  • PLEASE HELP! 2D Animation!
    12·1 answer
  • What would you have to know about the pivot columns in an augmented matrix in order to know that the linear system is consistent
    13·1 answer
  • A method that movie distributors are adopting to make it possible to view movies instantly, without DVD, is known as:
    11·1 answer
  • There are some network modeling tools that can ________ the existing network.
    12·2 answers
  • A boundary marks the inside and outside of a system and sets the system apart from its environment.
    11·1 answer
  • True or False: the sky looks blue because it is reflecting the blue ocean.​
    12·2 answers
  • While storms could be a cause, power______ are more likely to be caused by disturbances from high-demand equipment in a home or
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!