1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blizzard [7]
3 years ago
9

Mối quan hệ giữa đối tượng và lớp

Computers and Technology
1 answer:
Andreas93 [3]3 years ago
8 0

Answer:

please write in english i cannot understand

Explanation:

You might be interested in
What is ODBC? How is it related to SQL/CLI? 10.2. What is JDBC? Is it an example of embedded SQL or of using function calls? 10.
tamaranim1 [39]

Answer:hhhhhhhhh

Explanation:

5 0
3 years ago
Which of the following is an example of machine learning?
babymother [125]

Answer: auto correct

Explanation: The iPhone can determine what you are going to type because of your past history.

8 0
2 years ago
1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your
enyata [817]

Answer:

The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.

It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.

Explanation:

Solution

One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.

The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.

As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options

4 0
3 years ago
Employing the use of a(n) <br> will help you manage a STEM project.
LiRa [457]

Answer:

technicians

Explanation:

the answer is technicians. in my freshmen year we made flash cards and i still have them so i remember it.

7 0
3 years ago
If you have a list of words that you wish to make into a bulleted list, you must first highlight or ________ the words with your
motikmotik
<h3>Answer:</h3>

C. select

<h3>Explanation:</h3>

A. if you delete the words you can make them into a bulleted list

B. if you remove them you can make them into a bulleted list neither

D. Copying the words doesn't need for that

Hope it helped you

3 0
4 years ago
Other questions:
  • PLZ HELP ASAP!!!
    10·1 answer
  • To create a formula in ____, you would first click in one of the cells.
    15·2 answers
  • Which name is given to a set of communications standards for simultaneous digital transmission of voice, video, data, and other
    6·1 answer
  • What special precautions should you take when detailing a steel-framed building to avoid excessive conduction of heat through th
    9·1 answer
  • All java classes must contain a main method which is the first method executed when the java class is called upon.
    10·1 answer
  • Which of the following skills do employers in any field expect their employees<br> to have?
    5·1 answer
  • hey guys. I have bitmoji but the stickers just won't load. it says 'we couldn't retrieve you stickers, or says an error message.
    5·1 answer
  • Define operator precedence ? explain with an example.​
    13·1 answer
  • Core to resource management system is the _________that coordinates the server hardware.
    8·1 answer
  • Which case would benefit from Explainable Artificial Intelligence (AI) principles?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!