1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Galina-37 [17]
3 years ago
9

Which option describes wearable technology?

Computers and Technology
1 answer:
Vadim26 [7]3 years ago
7 0

Answer:

i would go with the answers are A and D but if you can only chose 1 it is A

Explanation:

the answer is (A)

P.S. let me know if its right

You might be interested in
Peripherals can be used to output information.<br> True<br> False
sweet [91]
True.






----------------------------
6 0
2 years ago
Read 2 more answers
You have a large dataset that will print on several pages. You want to ensure that related records print on the same page with c
Mumz [18]

Answer:B

Explanation:

3 0
3 years ago
What X coordinate does the center of a game begin at?
kotegsom [21]

A. 0

I am not entirely sure, I am not much of a coder(well I am but I don’t code often) so I hope this helps!

5 0
3 years ago
Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n
kotegsom [21]

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

6 0
3 years ago
In Excel, you can sort a table by one or more columns by.
timofeeve [1]
Ushsbcjdiosjdhwjwjif math
8 0
3 years ago
Other questions:
  • Examples of algorithm
    5·1 answer
  • What three steps Name a group??
    14·1 answer
  • Which data type is most suitable for a password field
    12·1 answer
  • What command prompts should be used to assign an IP address to:
    9·1 answer
  • Write a calculator program that keeps track of a subtotal like real calculators do. Start by asking the user for an initial numb
    12·1 answer
  • In the Advent of computer technologies and it's applications, to what extent these technologies have influenced the world.
    11·1 answer
  • What is the turns ratio of the transformer T10261
    5·1 answer
  • Which of the following is NOT part of the URL for an Internet web site?
    13·1 answer
  • Anyone else like hunter x hunter?<br> lets talk abt it uwu<br><br> good day :)
    14·2 answers
  • I need help so bad it’s the entire test for EdHesive python coding Test 2
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!