1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
5

Can someone please help I need help ASAP I pick Computers and technology because it doesn’t have the one I want

Computers and Technology
1 answer:
Hitman42 [59]3 years ago
7 0

Answer: D

First person referrs to <em>me</em>. For example, "I am eating." Or "My dog is eating." (The second example is also true, because you are talking about <em>my</em> dog.)

The only answer choice with <em>me</em> or <em>my</em> or something along the lines of that is D.

Whenever there is a "she" or "he" or "it" as the subject, that's 3rd person.

Hope that helped,

-sirswagger21

You might be interested in
Which tool encrypts entire drives, rendering them unusable unless one possesses the correct key to unlock the drive?
xxMikexx [17]

Answer:

Whole disk encryption.

Explanation:

Whole disk encryption, also known as, the full disk encryption is a tool that encrypts the entire drive. The whole disk encryption protects the whole hard drive from unwanted visitor to enter into your system.

<u>This tool protects your entire data, softwares, files, etc stored in the hard drive. Whole disk encryption cedes the entire hard drive unusuable untill correct key is entered to unlock the drive.</u>

Thus the correct answer is 'whole disk encryption.

8 0
4 years ago
Write a script that calculates the common factors between 8 and 24. To find a common factor, you can use the modulo operator (%)
AnnyKZ [126]

Answer:

  1. common = []
  2. num1 = 8
  3. num2 = 24
  4. for i in range(1, num1 + 1):
  5.    if(num1 % i == 0 and num2 % i == 0):
  6.        common.append(i)
  7. print(common)

Explanation:

The solution is written in Python 3.

Firstly create a common list to hold a list of the common factor between 8 and 24 (Line 1).

Create two variables num1, and num2 and set 8 and 24 as their values, respectively (Line 3 - 4).

Create a for loop to traverse through the number from 1 to 8 and use modulus operator to check if num1 and num2 are divisible by current i value. If so the remainder of both num1%i and num2%i  will be zero and the if block will run to append the current i value to common list (Line 6-8).

After the loop, print the common list and we shall get [1, 2, 4, 8]

8 0
4 years ago
After creating the home page or any other page of a website and adding content to it, it must be displayed in a browser to view
konstantin123 [22]

Answer:

The answer is "True".

Explanation:

The web page is also known as a home page when it collects more than one page, it is called website. In web page designing, it uses the HTML for design a page and is also available via the web or other networks.

  • When we insert a URL address to the Web page, it means, it contains the text, graphics, and hyperlinks to other Web pages and files.
  • It also displays all the data on the page, that's why the given statement is true.
3 0
4 years ago
Which of the following are possible ways to
Andru [333]

Answer:

employ ability assessments and the ability to perform tasks

Explanation:

6 0
3 years ago
Read 2 more answers
An attacker is preparing to perform what type of attack when the target vulnerabilities include headers and payloads of specific
kari74 [83]

An attacker is preparing to perform what Application attack  when the target vulnerabilities include headers and payloads of specific application protocols.

<h3>What Is an Application Attack?</h3>

An application attack is known to be a type of system attack which is made up of cyber criminals that is said to have access to any unauthorized points.

Note that this kind of Attackers are  the ones that start by  looking at the application layer, and then looking for any kind of application vulnerabilities that is found within the code.

Learn more about vulnerabilities from

brainly.com/question/25633298

3 0
2 years ago
Other questions:
  • Many who enter the field of information security are technical professionals such as __________ who find themselves working on i
    13·1 answer
  • Mathematical computations by a computer are faster than your quickest mathematical computations because the top speed of a neura
    13·1 answer
  • Most of the pollution in the ocean comes from:
    11·1 answer
  • Which software product release category is "generally feature complete and supposedly bug free, and ready for use by the communi
    7·1 answer
  • You are part of a team that is setting up a movie streaming service. The company is planning on initially making available 500 m
    8·1 answer
  • Which of these parts serves as the rear cross structure of a vehicle?
    12·1 answer
  • Which are examples of types of audio media that can support a presentation? Check all that apply.
    14·2 answers
  • PLEASE SOMEONE ANSWER THIS
    14·2 answers
  • Write the two features of a mouse.​
    9·1 answer
  • Write a function named swapFrontBack that takes as input a vector of integers. The function should swap the first element in the
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!