1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ollegr [7]
3 years ago
9

What is the point of brainy when other people have to answer your questions but not the cumputer

Computers and Technology
1 answer:
xxTIMURxx [149]3 years ago
3 0
Why are you asking this, it isn't a place to ask this.
You might be interested in
The Quake, One of the first fully 3D games was released in the year? 1986 1996 1995​
kipiarov [429]
It was released in 1996
5 0
3 years ago
Which is NOT an event associated with the beginning of the internet
sammy [17]

Answer:

when Gandhi was born he had nothing to do with the internet. nothing can connect Gandhi to the internet.

Explanation:

Gandhi was an Indian activist who was the leader of the Indian independence movement against British colonial rule. therefore, there is no connection.

8 0
3 years ago
How does one commit accounts receivable fraud?
disa [49]
The answer is B) bill customers for the amount they purchased, but record lower purchases in the ledger and pocket the money. A fraud is one of two types of mistake in the recording process which done with a deliberate intention. The account receivable department responsible for recording sales transaction and billing the customers. Thus, the account receivable fraud can be committed in this process.
5 0
2 years ago
Read 2 more answers
A security administrator is conducting a penetration test on a network. he connects a notebook system to a mirror port on a netw
svetoff [14.1K]

Active fingerprinting is the process the administrator use in the penetration test and the following uses hacking techniques to actively discover inner vulnerabilities is Penetration testing also <span>vulnerability scanning is made within the security perimeter; penetration testing is performed outside of the security perimeter.</span>

7 0
2 years ago
What are the benefits of networked computing​
iogann1982 [59]

Answer:

The ability to select the most appropriate computer networking technique.

Accessibility is a plus.

Reduce software expenses.

Make use of a database that is centralized.

Keeping sensitive information safe.

6 0
3 years ago
Other questions:
  • Select the correct answer.
    7·2 answers
  • A search engine is aprogram to search......<br>​
    7·1 answer
  • What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks?
    15·1 answer
  • If you copy and paste from someone else's document (such as a website, a friend's paper, an instructor's solutions manual, etc.)
    15·1 answer
  • I need help under standing an assignment, I've contacted my teacher but I want to finish this class already. Here's the directio
    11·1 answer
  • A computer consists of both software and hardware. a)Define the term software​
    5·1 answer
  • Hvhblfffffffff<br> eafafaefafsa
    9·2 answers
  • You are configuring NIC teaming on a server with two network adapters. You chose Switch Independent Mode. You now must choose be
    15·1 answer
  • 15. Feelings (maps, coins, clues, etc.) and the invisClue books were some innovative ways used to keep __________ players engage
    8·2 answers
  • You have been asked to advise a group of several universities who want to combine research efforts and store data in the cloud.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!