1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
3 years ago
15

Which of the following types of networks encrypts data for transmitting over

Computers and Technology
1 answer:
vova2212 [387]3 years ago
3 0

Answer:a

Explanation:

You might be interested in
Given the string variable address, write an expression that returns the position of the first occurrence of the string "avenue"
MrMuchimi
String temp;

for i = 0 to Address.length - 6 do 
begin
     temp = copy(address, i, i + 6) //returns a substring of a string beginning at
                                                     //i and ending at i + 6 
     if temp = 'Avenue' then
          return i;
   
end;
8 0
3 years ago
With the range E2:E30 selected, create a new conditional formatting rule that uses a formula to apply yellow fill and bold font
Nana76 [90]

Answer:

Attached are the excel screenshots

3 0
4 years ago
Frank lives in an area that experiences frequent thunderstorms. What precautionary measure should he adopt?
Sonja [21]

Answer:

I would go with A

Explanation:

6 0
3 years ago
What is the purpose of a email
jasenka [17]

Answer:

An email is a digital message sent electronically from one computer to one or more other computers. Emails are flexible and can be used for giving instructions, serving as documentation, providing confirmation, communicating rules and procedures, making recommendations, providing a status update, making an inquiry.

7 0
4 years ago
Read 2 more answers
What is the arc of technology it can't be a brand or app
Maru [420]

aim or audacity or avatar

bluetooth or blogspot

camera or cpu or core

5 0
3 years ago
Other questions:
  • Imagine that you are an independent filmmaker making a feature-length narrative film in the United States, with a variety of bot
    11·2 answers
  • Where can I easily find an easy app or program to use for making/editing videos?
    13·1 answer
  • Describe a time when you influenced someone else’s knowledge around technology, whether it be an app, a new gadget, etc. What di
    14·1 answer
  • Design a program that will receive a valid time in the 24-hour format (e.g. 2305) and convert to its equivalent 12-hour format (
    14·1 answer
  • Suppose we have a byte-addressable computer with a cache that holds 8 blocks of 4 bytes each. Assuming that each memory address
    7·1 answer
  • When you first launch presentation software, how many blank slides will appear on your screen?
    5·2 answers
  • 20 POINTSS!! NEED HELP!!
    12·2 answers
  • On tool hackers use to get sensitive information from victims is/are:
    15·2 answers
  • 15. It is the process of capturing data or translating information to recording format
    12·1 answer
  • which two functions are performed at the llc sublayer of the osi data link layer to facilitate ethernet communication? (choose t
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!