1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
3 years ago
8

WILL GIVE BRAINLIEST TO HELPFUL ANSWERS!

Computers and Technology
1 answer:
sashaice [31]3 years ago
7 0

Algorithm is part of computer science. You an learn it on Khan academy. (you probably werent looking for this but no one was answering)

You might be interested in
Discuss how a lack of infrastructure in poor communities could contribute to ill-health such as the Unrest looting.​
shutvik [7]

Answer:No service from hospital for injured people

Explanation:

Yes of course

4 0
2 years ago
The transport layer protocol used by the tcp / ip suite that does not provide guarantees on ordering or confirmation of receipt
VARVARA [1.3K]
UDP = connectionless vs. TCP is connection oriented.
4 0
3 years ago
Computer science student jones has been assigned a project on how to set up sniffer. What just he keep in mind as part of the pr
noname [10]

In the case above, what just comes to  mind as part of the process is option d.

<h3>What is sniffer?</h3>

A sniffer is known to be a kind of a software or hardware tool that gives room for a person to be able to “sniff” or look through one's internet traffic in real time, getting  all the data flowing to and from a person's computer.

Therefore, In the case above, what just comes to  mind as part of the process is option d.

Learn more about sniffer from

brainly.com/question/14265770

#SPJ1

3 0
2 years ago
• In your response, please include some examples of the three different types of storage.
babunello [35]
Hard Disk Drive
Solid State Drive
And Random Access Memory (RAM)
6 0
3 years ago
Read 2 more answers
Pls awnser I will mark brainliest as soon as possible
german
What are the multiple choice answers?
6 0
2 years ago
Read 2 more answers
Other questions:
  • 14. Which commercial RDBMS product was the first to hit the market and is the biggest?
    15·1 answer
  • What is an extrinsic value? A. something that is valuable in and of itself B. something that is valuable because it leads to ano
    12·1 answer
  • What is the difference between deta security and privecy ?
    12·2 answers
  • When naming a file you should use the _____________ instead of a space in a filename.
    6·1 answer
  • Which option can Jesse use to customize her company’s logo, name, address, and similar details in all her business documents?
    7·1 answer
  • Assume you are a network consultant for a company that is designing a private WAN to communicate between five locations spread t
    10·1 answer
  • Computers are designed with what type of memory?
    13·1 answer
  • Remember partially filled arrays where the number of elements stored in the array can be less than its capacity (the maximum num
    14·1 answer
  • Compared with other PC operating systems, the Linux-based operating systems:
    13·1 answer
  • In a typical office, biometric authentication might be used to control access to employees and registered visitors only. We know
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!