1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vadim26 [7]
3 years ago
6

How many answers do you need to be able to write messages on here??

Computers and Technology
1 answer:
Kipish [7]3 years ago
3 0

1,000

Hope this helps!



~Courtney

You might be interested in
Paige is writing about the progress her team made in setting up a new software system. in one detail, she tells that the team co
jenyasd209 [6]

Answer:

Also

Explanation:

Just checked it in the system

3 0
3 years ago
Read 2 more answers
Which routine is configured to execute first when the program runs?
tester [92]
It's D because of ok
4 0
3 years ago
You have installed a device that has eight interfaces and does not forward broadcast packets. What kind of device did you instal
Novay_Z [31]
A router, possibly. Thought I'm not for sure because I'm not in computers and technology

7 0
3 years ago
Read 2 more answers
1. According to the Department of Commerce, _________ percent of single moms in the US qualified as poor.​
Allisa [31]

Answer:

. According to the Department of Commerce, 34.0% percent of single moms in the US qualified as poor.​

Explanation:

8 0
3 years ago
An administrator deploys a basic network intrusion detection (NID) device to block common patterns of attacks. What detection me
shusha [124]

The type of detection method that this basic network intrusion detection (NID) device use is Signature-based.

<h3>What is signature-based detection?</h3>

A Signature-based detection is known to be a term that is often referenced to cybersecurity.

Note that it involves the use of footprints to recognize any form of malware. It is known that have programs, apps, software, etc., often consist of a digital footprint and as such the use of this detection can be able to identify the attack.

Learn more about  network intrusion from

brainly.com/question/26199042

8 0
2 years ago
Other questions:
  • Carlos owns a hardware store. He currently is not using any software to track what he has in the store. In one to two sentences,
    9·2 answers
  • How many nibbles are in 18 bytes??
    5·1 answer
  • Create an application that writes a series of random numbers to a file. Each random number should be in the range of 1 through 1
    9·1 answer
  • Which of the following could be true of two diffrent speicies that have competitieve realtionship in the same ecosytem?
    10·1 answer
  • Write a program that echos back any inputted integer greater than 1, and exits when a 0 is entered. Your program should use a co
    11·1 answer
  • Regular languages are closed under complement. True False
    7·1 answer
  • What is the difference between MAC address and IP address?<br> Thanks in advance
    6·1 answer
  • You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home usi
    9·1 answer
  • A(n) ___ is a set of CPUs which work in parallel in an attempt to simulate the way the human brain works, although in greatly si
    5·1 answer
  • Arrange these steps of creating a presentation in the correct order. (notice that the given order is incorrect other than the ba
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!