1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
3 years ago
10

Vghfthcnbvhghvngjgjvjgkb, kcnjc cnnfjdhd mc Dan Jfhjc cm. Cm n n hdjfjocnkcnd

Computers and Technology
2 answers:
seropon [69]3 years ago
6 0

Is this supposed to be a question?

Alexxandr [17]3 years ago
4 0

The Answer is lkwnnewkk,ekcrcomciibfwxdmfcxechiuhfcmiuhrichihrf ubfbfb f e v fv v v fvfvfvfvfv fvfvffv

You might be interested in
Software that allows users to use and adapt it for any purpose, often allowing the public to participate in further development
Sphinxa [80]

Answer:

Open Source

Explanation:

When a developer makes something open to the public, free to edit and use how they want, they make the project open source.

4 0
3 years ago
Read 2 more answers
Which feature helps an edit-test-bug cycle work faster in the python programming language?
Igoryamba

Answer:

C. Testing

if i had to guess

3 0
3 years ago
Read 2 more answers
1. A video card on a modem motherboard would run best in which type of slot?
Gnoma [55]

Answer:

2.PCIe

Explanation:

When the PCI EXPRESS was not made, the PCI used to be the best type of slot for the video card on the modem motherboard. However, with the arrival of PCIe or the peripheral component interconnect express, we got an interface standard that could be used for connecting the components with very high speed. And each of the PC motherboards comes with numerous PCIe slots which once can make use of for adding the GPUs like video cards, RAID cards, graphics cards, SSD add on cards, and the Wi-Fi Cards. Thus the correct option above is certainly, 2. PCIe.

3 0
3 years ago
. The first step in devising security services and mechanisms is to develop a security policy True False
Evgen [1.6K]

Answer: True

Explanation: For the creation of the security services and function the first step is having a policy regarding the security measure that is to be taken.Security policy consist of the procedures and function that should be implement in the system as a plan.

It monitors the flow,accessing of external component ,data assessment etc fro the protection.After the policies are made then the implementation take place. The most common deployment of this policy is in information technology(IT)sector .Thus, the given statement is true..

5 0
3 years ago
How could you fact check a news report that you saw on television
Phoenix [80]
I would have to say D) because they know the real answer.

5 0
3 years ago
Other questions:
  • Identify requirements that should be considered when determining the locations and features of firewalls. What are some importan
    5·1 answer
  • HELP ASAP U GET BRAINLIEST
    15·2 answers
  • I’m nobody. Who are you?
    9·2 answers
  • Anthony is responsible for tuning his organization's intrusion detection system. He notices that the system reports an intrusion
    8·1 answer
  • The Rule of Thirds is a way to:
    14·1 answer
  • Designing a video game takes tons of creativity. What inspires your personal creativity and ideas for video games? Explain and g
    15·1 answer
  • Select the correct answer.
    5·1 answer
  • Which statement best describes the computers all around us
    9·1 answer
  • How to be gud at Friday night funk
    11·1 answer
  • It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end o
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!