1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Butoxors [25]
3 years ago
10

In an oblique drawing, which lines can be measured accurately, if there is no foreshortening?

Computers and Technology
1 answer:
Gwar [14]3 years ago
6 0
The correct answer is a i did this before you all

You might be interested in
Is mayonnaise technically an instrument?
stich3 [128]
No it doesn’t count as an instrument
7 0
3 years ago
Read "Penetration Testing – Reconnaissance with NMAP Tool," located within the required readings. In the article, the authors di
steposvetlana [31]

Answer:

Check the explanation

Explanation:

The two tools that are utilized for consideration in cyber attacks are operating systems and computer systems. The operating system Kali Linux 2.6 3.x Mix (64-bi) and windows XP SPO (32-bit).

Penetration testing is a very important technique or procedure in auditing the loopholes and security in a particular operating system. The computer systems are Nmap and VMware. The author posit that VMware is a virtual machines programming that gives a virtual PC the capacity for more than one event or action of the working frameworks to keep cunning one similar server.

Nmap (“Network Mapper”) according to the authors, it is a free and open source utility for system reviewing and security. these tools are used for the purpose of finding an open port and to also gain access while another considers the vulnerabilities of the operating system.

ALL together these tools assist in building the foundation for ethical hacking. Using Nmap allows a hacker to gain access to the system thereby seeing all the flaws to actively peruse that account. All these tools work together for a successful hacking process and procedures.

5 0
3 years ago
State one way the projector can be integrated into teaching and learning ​
koban [17]

Answer:

The projector con be used to show videos or pictures on a particular subject or topic to gain more understanding

4 0
3 years ago
Why is there more than one Brainly website?
marta [7]

they are for different countries and languages

8 0
2 years ago
Read 2 more answers
If classes C1 and C2 both implement an interface Cint, which has a method whichIsIt, and if C1 c = new C1( ); is performed at on
Assoli18 [71]

Answer:

FALSE

Explanation:

Because C1 and C2 implement the same interface, they both implement whichIsIt. The variable c is known as a polymorphic variable, meaning that it can change from being an C1 to a C2. So, the message c.whichIsIt( ); may invoke C1's whichIsIt or C2's whichIsIt. This can only be known at runtime.

5 0
3 years ago
Other questions:
  • All the processing-of work-done on a computer is performed by the what?
    11·1 answer
  • ​_______ consists of the analysis​ tools, technologies, and processes by which marketers dig out meaningful patterns in big data
    7·1 answer
  • Jeff wants to print quickly so he presses the Ctrl and the P. Jeff used a _____. macro invoice template shortcut
    15·1 answer
  • The component that allows you to make a paper-based copy of a body of text is the _____.
    12·1 answer
  • An inventory clerk, using a computer terminal, views the following on screen: part number, part description, quantity on hand, q
    8·1 answer
  • Anyone know the answer I need help
    12·1 answer
  • Office ____ is the current version of Microsoft Office for Mac operating systems.
    12·1 answer
  • What is the value of 8n when n= = 2?​
    13·1 answer
  • Which statement is true about biometrics as an authentication method?​
    11·1 answer
  • What are the six primary roles that information system play in organizations? How are information system used in each context
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!