1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariulka [41]
4 years ago
7

It's fill the gap homework

Computers and Technology
1 answer:
enyata [817]4 years ago
6 0

beaiutuvssu mean lo seco mein es

You might be interested in
Attackers craft malicious probe packets and scan for services such as HTTP over SSL (HTTPS), SMTP over SSL (SMPTS) and IMAP over
pentagon [3]

Answer:(d)Scan shows that no scanned port is live on the network

Explanation:

Honeypot shows any attempt of unauthorized access to information in the system. Scan showing not scanned port is live on the network shows the presence of honeypot so that hackers could be trapped to be believed that there are no scanned port.

4 0
3 years ago
What is the full meaning of ICT
leva [86]
Information commination technology :)
6 0
4 years ago
Read 2 more answers
Who made the first electronic device?
emmasim [6.3K]
Joseph Henry in about 1835. He is American and he made something called a relay.
6 0
3 years ago
If you want to remove the autocorrect options button from the screen, you can press the ____ key.
Luden [163]

Answer:

ESC

Explanation:

It allows the user to abort, cancel, or close an operation.

3 0
2 years ago
he Correct Coding Initiative (CCI) edits contain a listing of codes under two columns titled, "comprehensive codes" and "compone
iragen [17]

Answer:

The answer is "Option C"

Explanation:

The content management system promotes the accurate coding technique, which is used to monitor incorrect encoding, in which the comprehensive code is used, that compiles the code to defining or covering two or more CPT part code, packaged as one package, that's why "option c" is correct and other were wrong which can be defined as follows:

  • In option A, It is wrong because code can't be a component code.
  • Option B and Option D is wrong because it uses a comprehensive code only.

7 0
3 years ago
Other questions:
  • Video-sharing sites allow videos to be uploaded in which file format? A. .avi B. .svg C. .tiff D. .xls
    5·1 answer
  • Adele’s mother owns a Daycare and she wants to learn all about this business, to help her mom and own it one day. Which CTSO sho
    9·1 answer
  • Name three actions you can perform on an inserted image.
    7·2 answers
  • There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
    5·1 answer
  • Show the output waveform of an AND gate with the inputs A, B,
    5·1 answer
  • Any part of the computer that you plug into the CPU like a phone, tablet, headphones etc. are called
    5·1 answer
  • Write a python program to find factorial, use exception handling and display an appropriate message if the user inputs alphabets
    7·1 answer
  • What are the steps in preparing a bootable USB installer?​
    11·1 answer
  • USE PYTHON TURTLE GRAPHICS
    15·1 answer
  • What three-key sequence will bring up the task manager or allow a user to log off or restart the computer?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!