1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faltersainse [42]
3 years ago
9

GIVING BRAINLIST TO WHOEVER ANSWERS

Computers and Technology
1 answer:
valentina_108 [34]3 years ago
8 0
The answer is number 4
You might be interested in
What is the purpose of the literature review section of research paper
navik [9.2K]

variation of colored sediment

5 0
3 years ago
Which of the following is the single best rule to enforce when designing complex passwords?
saw5 [17]

Answer:

B. Longer passwords

Explanation:

If the password is longer, it requires more incorrect attempts to find it, so the system could identify a potential hacker attempt. Smaller but more complex passwords could be identified by mistype or forgotten passwords.

3 0
3 years ago
Which search strategy is most similar to greedy search?
lesya692 [45]

Answer:

I think the answer would be A.

Explanation:

If I'm wrong plz let me know (I think I may be wrong)

8 0
3 years ago
What does the Communications Decency Act of 1996 provide?
Softa [21]

Answer:

a

Explanation:

its the correct becayse

3 0
2 years ago
What is the name of the app that works like a emp jammer from your iphone app
lions [1.4K]

To my knowledge there is not one if that did somehow occour, it would result in your phone also getting fried by the EMP and render the app useless before it effected anybody else's phone or other devices. hope this answered your question:)

4 0
3 years ago
Other questions:
  • The ____________ is the number of rectangles an image has in a square inch.
    11·2 answers
  • Your network administrator finds a virus in the network software. Fortunately,
    13·1 answer
  • "A ____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, an
    5·1 answer
  • On his computer desktop, Rodney can see several different files, each immediately accessible. Because he is actively working on
    13·1 answer
  • How can you solve real world mathematical problems using two linear equations in two variables​
    11·1 answer
  • Write a program that use a switch statement whose controlling expression is the variable area code. If the value of area_code is
    12·1 answer
  • Any material that comes into contact with the body must be __________.
    6·1 answer
  • Write 4 types of viruses , explain them briefly.
    7·1 answer
  • Explain the term software dependability. Give at least two real-world examples which further elaborates
    9·1 answer
  • Create an application named SalesTransactionDemo that declares several SalesTransaction objects and displays their values and th
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!