1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
3 years ago
14

Which is correct? And for the second one the drop down answers are 1. Leadership

Computers and Technology
2 answers:
Lena [83]3 years ago
6 0

Answer:

1.

Explanation:

SIZIF [17.4K]3 years ago
4 0

Answer:

It is a spreadsheet application. the second should be leadership

You might be interested in
3. Run the C-LOOK algorithm (requests can only be serviced when the head is moving toward higher numbered tracks); the head is c
o-na [289]

Answer:

See explaination.

Explanation:

An algorithm is specifically defined as the step by step method or process of achieving any type of result.

Please kindly see the attached file for the C algorithm that fulfils the answer of the given problem.

3 0
3 years ago
need help plz....What is a bug? A. A person who tests a program B. An error in a program's code C. A window that runs a program
serious [3.7K]

In programming, a bug would be (B.) an error in a program's code.

5 0
4 years ago
Read 2 more answers
Pundits attributed Obama’s 2012 victory to which social media site?
maksim [4K]

twitter i think -----------------------------

5 0
4 years ago
Read the following scenario:
hjlf

Answer ask fro elp

Explanation:

7 0
3 years ago
John, an ethical hacker, is demonstrating a proof-of-concept IoT attack. For this demonstration, he used a jammer to jam and sni
scoundrel [369]

Answer:

BlueBorne Attack

Explanation:

If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.

Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication

Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.

4 0
3 years ago
Other questions:
  • Which function prompts the user to enter information?
    10·2 answers
  • Can Any body Define what is search engine in a simple language quick please​
    14·1 answer
  • Hurry answerrrrrrr pleaseee
    11·2 answers
  • Given the following sets, for each set operation provide the elements of the resulting set in set notation or using a well-known
    5·1 answer
  • Often technical personnel who are not familiar with security techniques think that restricting access to ports on a router or fi
    5·1 answer
  • MULTI SELECTION
    9·1 answer
  • Yo, what's the tinyclick.ml/7hTq link?? I don't trust it, but I'm curious-
    10·1 answer
  • It's generally best to use what types of sites for factual internet research? Select all that apply from the choices below.
    5·2 answers
  • If “A” represents in binary 10011001, what will be the value of word “CAB”?
    15·1 answer
  • How do you get your winkey wet??
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!