1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
White raven [17]
3 years ago
6

I need help with this plz! It’s for a test and I really need help

Computers and Technology
1 answer:
Bas_tet [7]3 years ago
4 0

Answer:

c

Explanation:

assuming you are coding in python and have not install any calculation codes, the answer is most likely c

You might be interested in
Where could an identity theft access your personal information?
noname [10]
Hey there!

Here is your answer:

<u><em>The proper answer to your question is "through websites".</em></u>

Reason:

<u><em>There are many ways identity thefts make there attacks but the most common ways is using unsafe websites. These websites most likely sell cheap products that require you to give all of your personal information in order to buy the product. </em></u>

Therefore the answer is using unsafe websites.

If you need anymore help feel free to ask me!

Hope this helps!

~Nonportrit
8 0
2 years ago
Read 2 more answers
Explain use of information and communication technology in our daily life.
lions [1.4K]

Answer:

It can improve the quality of human life because it can be used as a learning and education media, the mass communication media in promoting and campaigning practical and important issues, such as the health and social area. It provides wider knowledge and can help in gaining and accessing information.

<em>That</em><em>'</em><em>s</em><em> </em><em>my</em><em> </em><em>answer</em>

4 0
2 years ago
Which of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and det
Marrrta [24]

Answer: Option B. System logs

Explanation:

A system log contains records of events that are logged by the operating system components. These events are often predetermined by the operating system itself and they indicates how the system processes and drivers were loaded. System log files may contain information about device changes, device drivers, system changes, events, operations and more.

6 0
3 years ago
Read 2 more answers
Apakah maksud input dan output ?<br>​
Nana76 [90]

INPUT ADALAH KOMPONEN PIRANTI KERAS YANG MEMUNGKINKAN USER ATAU PENGGUNA MEMASUKKAN DATE KE DALAM KOMPUTER ATAU BISA JUGA DISEBUT SEBAGAI OUTPUT ADALAH DATA YANG TELAH DIPROSES MENJADI BENTUK YANG DAPAT DIGUNAKAN!

4 0
3 years ago
You should periodically perform basic computer maintenance on your computer.<br> True<br> False
kotegsom [21]

Answer:

that's true after some period of time it's necessary

8 0
2 years ago
Read 2 more answers
Other questions:
  • When Aaron was called for an interview at a graphic designing company, his first interview test assessed his creativity and his
    7·2 answers
  • Which markup language would be considered the most current for web design? HTLM, HTML5, XHTLM, XHTML 6
    14·2 answers
  • Assume you have taken another square picture with the 25-megapixel digital camera discussed in the previous question. This time
    8·1 answer
  • Intel® Core™ i5-7500 is one of Intel's 7th generation of microprocessors and was launched earlier in 2017 and has been used in m
    13·1 answer
  • A. Write a program that asks the user to enter an integer, then prints a list of all positive integers that divide that number e
    11·1 answer
  • Why are new versions of applications packages released often ​
    9·1 answer
  • It is impossible to use a computer without a mouse. Is this statement true or false?
    10·1 answer
  • One tool under What-If-Analysis is Scenarios. Which best describes the purpose of setting up and using scenarios
    5·1 answer
  • 4
    15·2 answers
  • Most IT security threats originate with hackers.<br> Question 3 options:<br> True<br> False
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!