1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anton [14]
3 years ago
8

Cuales son los tipos de galeria virtual

Computers and Technology
1 answer:
Lelu [443]3 years ago
5 0
¿Está usted preguntando cómo la galería virtual es importante, o el impacto que tiene.
You might be interested in
IMPORTANT!!<br><br> How can you get real answer keys for edmentum (plato) courses as a student?
dimulka [17.4K]

Answer:

Looking up the answer on google works but in my experience if you put the whole question onto brainly then look for the one with the best stars and most then the answer will be correct, thats how i have 100% on all my assingments, sorry if this isnt the answer you wanted but it helps

Explanation:

4 0
3 years ago
Can anyone answer this ​
Ivenika [448]

Answer:

I dont see the question

Explanation:

7 0
2 years ago
All of the following are examples of what rigorous coursework in high school might mean except: A) added reading assignments. B)
faust18 [17]

Answer:b

Explanation:

3 0
3 years ago
Read 2 more answers
Which statement is true regarding Artificial Intelligence (AI)?
Effectus [21]
Data is the fundamental reason AI succeeds or fails.
This statement is true regarding Artificial Intelligence (AI)
6 0
3 years ago
Scenario: 1. Victim opens the attacker's web site. 2. Attacker sets up a web site which contains interesting and attractive cont
Ann [662]

Answer :

These sort of attacks are known are Injected IFrame Attacks. The Injected IFrame Attacks are a common Cross Site Scripting or XCC attack that contains multiple or single iFrame tags implemented within a page which is not visible to user. User unintentionally enters his information which is posted to hacker’s server and information’s gets hacked.

5 0
3 years ago
Other questions:
  • What financial behaviors will typically lead to a low credit score?
    14·1 answer
  • Whos ready for sao ordinal scale this march!!!( ಥـْـِـِـِـْಥ)
    7·1 answer
  • Which one of these students is having a positive impact?
    8·2 answers
  • ________________are programs that designed to help users to be more productive with their personal tasks
    11·2 answers
  • Which of the following is NOT one of the Big 3 Google Applications that we discussed?
    9·2 answers
  • Write the definition of a function reverse, whose first parameter is an array of integers and whose second parameter is the numb
    15·1 answer
  • 9.
    15·1 answer
  • In the program below, numA is a _____.
    8·2 answers
  • Compare the graphs. Find the value of h, k, or a.
    7·1 answer
  • Give one (1) advantage and one(1) disadvantage of using and integrated software package over a custom written one.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!