1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
3 years ago
10

Why do some people think the global economy is good for the United States?

Computers and Technology
1 answer:
maksim [4K]3 years ago
3 0

Answer: is a

Explanation:

You might be interested in
A hacker corrupted the name:IP records held on the HOSTS file on a client, to divert traffic for a legitimate domain to a malici
balu736 [363]

The type of attack that the hacker performed is Domain Name System (DNS) server cache poisoning.

<h3>What is DNS poisoning?</h3>

In Domain Name System (DNS) server cache poisoning, the hackers often enter into a DNS server because they want to make an adjustment to its directory so that it can point the domain name users enter to a wrong, IP address.

Note that Domain Name Server (DNS) poisoning is a form of system attack in which there is the change of DNS records which are then used to redirect online traffic to a wrong website.

Learn more about hacker  from

brainly.com/question/24956493

7 0
2 years ago
What was the strength of the Southern colonies? WILL GIVE BRAINLEST
Alex_Xolod [135]

Answer:

easy to grow crops should be the answer

4 0
3 years ago
What is the main function of the arithmetic logic unit (ALU)?
elena-14-01-66 [18.8K]
The answer is performing arithmetic and logical operations
7 0
3 years ago
If you are in the Slide Master view, what are the steps to add headers and footers?
Marta_Voda [28]

Answer:

THat is the correct order.

Explanation:

6 0
2 years ago
_______ is the process of checking data for validity and completeness
timurjin [86]
Data Editing is the answer
7 0
3 years ago
Other questions:
  • Which are malicious codes? <br><br> JavaScript <br> Key loggers <br> Scrum <br> Spyware <br> Worms
    12·1 answer
  • Create an instance of your queue that accepts java.lang.String Objects. Starting with an empty queue, use the enqueue(E e) metho
    15·1 answer
  • write a function that takes a string as parameter, return true if it’s a valid variable name, false otherwise. You can use keywo
    6·1 answer
  • To change the way a slide moves from one slide to the next, what tab should be selected?
    12·1 answer
  • So I emailed Brainly to deleted my account. Why haven’t they done so yet? I don’t want to get charged money for this app I was p
    14·1 answer
  • Which menu would most likely allow you to choose a font A.file B.Edit C.format D.insert​
    5·1 answer
  • tell us things u did as a kid but don't want to admit to it (best gets brainly 5 stasr and a thank you)
    13·2 answers
  • What is the binary number 0011 0011 multiplied by two?
    11·1 answer
  • Heeeeeeeelp :)<br> thx<br> jfdyiusjmkdsuiho;dmcvrvho;j
    5·2 answers
  • Shadow and highlight create depth (3D).<br> TRUE OR FALSE
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!