1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anygoal [31]
3 years ago
6

1.What is the term referring to an amount of money that is owed?

Computers and Technology
2 answers:
horsena [70]3 years ago
8 0

Answer:

Debt?

Explanation:

BARSIC [14]3 years ago
6 0

Answer:

debt

Explanation:

ur welcome brody

You might be interested in
Need done ASAP
Amiraneli [1.4K]

The correct answer is A. A1!

7 0
3 years ago
Secure Hashing Algorithm (SHA) is an algorithm for generating cryptographically secure one-way hash, published by the National I
vitfil [10]

Answer:

64 bits.

Explanation:

Secure Hash Algorithms (SHA) :- These are a family of cryptographic hash functions. There are basically four types of secure hash algorithms for generating cryptographically secure one-way hash.They are as following:-

SHA-0

SHA-1

SHA-2

SHA-3

SHA -2 consists of SHA-512 and the word size used by it is 64 bits.

3 0
3 years ago
Which of the following best describes the purpose of an Egyptian pyramid?
Flura [38]

Answer:

C

Explanation:

Had this on edgnuity

Please give a brainliest

7 0
3 years ago
Read 2 more answers
The process of adding a header to the data inherited from the layer above is called what option below
Tom [10]

Answer:

The correct answer to the following question will be "Encapsulation".

Explanation:

The wrapping of the data into a single unit or the method by which a header is applied to the data inherited from the above layer is termed as Encapsulation.

While relating to networking, encapsulation would be the method of storing and converting data through one protocol into another, so that the data can proceed over a network. A TCP/IP package contained under an ATM system, for example, is indeed a kind of encapsulation.

Therefore, Encapsulation is the right answer.

4 0
3 years ago
Where would the information needed to start a computer be stored?
ASHA 777 [7]

Answer:

BIOS software is stored on a non-volatile ROM chip on the motherboard. … In modern computer systems, the BIOS contents are stored on a flash memory chip so that the contents can be rewritten without removing the chip from the motherboard.

Explanation:

8 0
3 years ago
Other questions:
  • Mara's presentation included essential information about the company's new safety procedures. She wanted to make
    13·2 answers
  • A search engine displays a list of webpage names that contain the search text. what is the term for that list?
    14·1 answer
  • If a business owner wanted to create a banner ad for his business on his webpage, he could use Java programming to develop a (n)
    7·2 answers
  • Front office employees at the Melville Lodge use a computer-based system to manage, among other things, the central reservation
    13·1 answer
  • 9.2 code practice edhesive
    14·1 answer
  • Was LDAP version2 an internet standard in 1998? is it now?
    5·1 answer
  • Where can i make an animation for free?
    10·1 answer
  • 50 PTS
    5·1 answer
  • What is ICT?Write down the uses of ICT​
    6·1 answer
  • 4.8.4 Better Sum
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!