1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AysviL [449]
3 years ago
8

HELP PLEASE I WILL GIVE YOU 15 POINTS!

Computers and Technology
1 answer:
scoundrel [369]3 years ago
4 0

Answer:

look up some stories if you can like about dogs or something and then write why you like animals then write about how much you need to know about dogs or cats to be a good dog/cat owner

Explanation:

I already gave you the two stories didn't I in your last questions?

You might be interested in
What is the difference between a learner’s license and an operator’s license?
Alchen [17]
Learner's license<span> lets you take the wheel with an instructor while you learn to drive. A operators license is when you already passed your driving test and can drive on your own.

</span>
3 0
3 years ago
As time goes on, technology is likely to _______. A. Increase in complexity b. Decrease in complexity c. Stay at the same comple
amid [387]

Answer:

The answer to this question is the option "A".

Explanation:

In this question, the answer is Increase in complexity because, In computer science, the computerized or simply complexity is an algorithm. In this algorithm, the number of the resource is required for moving it (a quality separate to “complexity” in a conventional reason). So in this question the answer is option A that is  Increase in complexity.

5 0
3 years ago
Write an algorithm of telephone call system​
ivolga24 [154]

Answer:

this is the correct answer

3 0
3 years ago
Read 2 more answers
What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
ss7ja [257]

Answer:

Brute Force attack.

Explanation:

A network is a platform where end user devices like computers are connected to communicate and share resources. There are public networks and private networks.

A public network has its end devices and servers configured with a public IP address, which is routable on the internet, while private networks uses private IP addresses which can be used on the internet.

Private networks can be made accessable to public users by configuring an authentication and authorization policy, which could be one or a multi factor authentication. These requires a password and other factors to access the services of a private network.

An attacker can easily access a one factor or a password accessible user account, if the password is weak by using the process called a brute Force attack.

The brute Force attack exploits the vulnerability of weak passwords by entering possible valid combination from a defined set of possibilities.

6 0
4 years ago
Steve left his computer switched on in his room and went out to have breakfast. When he returned, he saw that the monitor had be
yanalaym [24]

Answer:

B

Explanation:

5 0
3 years ago
Other questions:
  • In a student​ database, a row that describes the top​ student, including his or her​ lastname, firstname, and​ studentnumber, is
    9·1 answer
  • )1-bit sign, 8-bit exponent, 23-bit fraction and a bias of127 is used for ___________ Binary Floating PointRepresentation
    11·1 answer
  • What are ways to enter a formula in Excel? Check all that apply. Click on the Function Library group and select a function from
    10·2 answers
  • Jennifer's company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting
    14·1 answer
  • This program will read integers from a file and find results from these integers. Open the file, test to make sure the file open
    12·1 answer
  • Why does world of tanks keep downloading when I'm not even at the computer
    9·1 answer
  • How can i get google assistant on my lava iris 820 smartphone easily???? ​
    10·1 answer
  • the increase and decrease font button and the change text colour button (as shown in the picture )are include in which group ?​
    6·1 answer
  • Create a basic program that accomplishes the following requirements: Allows the user to input 2 number , a starting number x and
    12·1 answer
  • . Imagine that you were programming without an IDE. What problems might you encounter?​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!