1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sloan [31]
3 years ago
5

2.

Computers and Technology
1 answer:
Masja [62]3 years ago
6 0

Answer:

is this a question or not?

You might be interested in
Torque is defined as _____.
BlackZzzverrR [31]
<span>something that produces or tends to produce torsion or rotation; the moment of a force or system of forces tending to cause rotation.

</span>
5 0
3 years ago
A is a paid placement that appears in a search engines results page at or near the top of the results
densk [106]
I wish I was smarter lol
4 0
3 years ago
An alteration threat violates information integrity. <br> a. True <br> b. False
Art [367]
The answer is True


It intentionally or unintentionally compromises a system by making unauthorized changes to data. As compared to intentional changes which are usually malicious, unintentional changes are normally accidental. Changes and modifications to the system configurations can also compromise integrity. Such modifications might include deleting, changing, and creating information in a network resource. It is best to implement mechanisms on how one can track and audit such changes as they happen




6 0
3 years ago
Which of these statements performs real number quotient division using type casting?
lara [203]

Answer:

Double x = 35 / 10;

Explanation:

Java provides simple data types for representing integers, real numbers, characters, and Boolean types. These types are known as _ or fundamental types.

<3

3 0
2 years ago
What are the four major software packages of microsoft​
Reika [66]

Answer:

» Microsoft word ( word processing )

» Microsoft powerpoint ( presentation )

» Microsoft access ( database mamagement )

» Microsoft excel ( spread sheets )

Explanation:

.

3 0
3 years ago
Other questions:
  • You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network I
    13·1 answer
  • What are 3 characteristics of syndrome E?
    13·1 answer
  • Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address
    11·1 answer
  • Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create form
    7·1 answer
  • Copyright applies to work at the time it was produced, written, and developed. True or False?
    10·2 answers
  • -Convert the 1's complement 10111010 to decimal
    15·2 answers
  • Claire writes a letter to her grandmother, in which she describes an amusement park she visited last week. She adds pictures of
    13·1 answer
  • What Are the Benefits of Using Leads Automation Tool?
    5·1 answer
  • In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be co
    13·1 answer
  • Write a program that produces the following output: CCCCCCCCC ++ ++ CC ++ ++ CC ++++++++++++++ +++++++++++++++ CC ++++++++++++++
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!