1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
4 years ago
5

Diverification means

Computers and Technology
2 answers:
7nadin3 [17]4 years ago
6 0
Do you have to write in your own words or is there a multiple choice? 
Zinaida [17]4 years ago
5 0
The act or pratice of manufacting a variety of products that i i kno
You might be interested in
True or false a relational database is one in which every data item is related to every other data item
Vilka [71]
I think false, because the rows in a table for instance, do not relate to each other, but can relate to rows in another table, if some of the columns are foreign keys, pointing to primary keys in another table.
8 0
3 years ago
A facility that is pre-wired for necessary telecommunications and computer equipment, but doesn't have equipment installed, is k
aniked [119]

Answer:

hot site

Explanation:

8 0
2 years ago
You begin your first day of responsibilities by examining the recent IS security breach at GearUp to get ideas for safeguards yo
pentagon [3]

Answer:

Sniffing is the correct answer to the given question .

Explanation:

The main objective of Sniffing is to leads and stealing the information interception by detecting the network activity this activity is done by the Sniffing process .When the information is sent through the networks, the information inside the data packet can be detected  by using a sniffer .The sniffer is used in sniffing process.Information is accessed  by the sniffer because the information packets that are sent in the network  are not secured.

By using the Sniffing technique the hackers hacked the company's improperly-secured wireless network and stole customers ' credit card details as well as employee social security numbers.

6 0
4 years ago
Scott does not use privacy settings on his social media
likoan [24]

Answer:

ARREST HIM!!!

Explanation:

7 0
3 years ago
Read 2 more answers
In number theory, a perfect number is a positive integer that is equal to the sum of its proper positive divisors, that is, the
rusak2 [61]

Answer:

Explanation:

def the_perfect(n):

  try: #exception handling if n is a negative number

       n > 0

   except: #return -1 if the error is reached

       return -1

  else:

        total = 0

        for i in range(1, n): #for loop from 1 to the target number

           if n % i == 0:

               total += i

   return total == n  #should return true if number is perfect number

print(perfect_number(8))

8 0
3 years ago
Other questions:
  • Write a program that asks how many tickets for each class of seats were sold, then displays the amount of income generated from
    10·1 answer
  • What is the process of getting as many people as possible to visit your website called? A. Maximizing keyword potential B. Direc
    9·2 answers
  • Why is time management considered a soft skill
    10·2 answers
  • Keith is researching a controversial topic and wants to use a website he found as an information source. Which of the following
    11·2 answers
  • What does the following if statement do?<br><br> if (num1 == Math.abs(num1))
    12·1 answer
  • NEED HELP WILL MARK BRAINLIEST AND 100 POINTS FOR ANSWER Which LIKE operator would match a single character?
    9·2 answers
  • Write down a scratch program which:
    5·1 answer
  • Explain the different type of shift register counter ​
    14·1 answer
  • Why header files are needed in every c program ?expalin​
    14·1 answer
  • where element is the Hypertext Markup Language (HTML) element and _____ pairs define the styles that are applied directly to tha
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!