1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pie
3 years ago
11

Uh i g08ujunuyv kjmn

Computers and Technology
2 answers:
Alik [6]3 years ago
7 0
Same bc I need them
svlad2 [7]3 years ago
6 0

;-;

So uhm-

I'ma just take the free 5 points?

:[

You might be interested in
To help determine which technology to use, Raul creates a table to help him compare the pros and cons of his choices. What part
love history [14]

The answer is analyzing choices/options

Analyzing choices/options is one of the several steps of the decision making processes. Analyzing your choices will help you determine how your final decisions will impact yourself and everyone else around you. It is in this step that you will be asking yourself the likelihood of the results of your decisions now and in the future. In addition, this step will help you review the pros and cons of your choices listed in the previous steps.

5 0
3 years ago
Technician A says that to cover all possible vehicle conditions, coolant must have a high freezing point. Technician B says cool
tiny-mole [99]
It would be option A!
please mark me brainliest ,
8 0
3 years ago
Read 2 more answers
1. provide at least 3 properties and 3 methods of the object computer.
ValentinkaMS [17]

Answer:

The answers to these questions are given below in the explanation section.

Explanation:

The following are 3 properties and 3 methods of the object computer.

Solution

Properties:

  1. computer name;
  2. computer model;
  3. computer color;
  4. computer manufacturer

Methods:

  1. Turn on/off
  2. Do Wordprocessing
  3. Connect Keyboard/Mouse
  4. Charging
  5. Play sound

The following are 3 properties and 3 methods of the object computer.

Properties:

  1. Car Model;
  2. Car Manufacturer;
  3. Car Color

Methods:

  1. Car Run (Speed)
  2. Change Gear
  3. Open/Close Door
  4. Turn on/off

7 0
3 years ago
9. The voltage of a replacement capacitor must
nasty-shy [4]

Answer:

B

Explanation:

It is the capacity (in Farad) of the capacitor that determines its behaviour in the circiut. The voltage is merely a qualification of what it can handle. Higher is "better".

6 0
3 years ago
Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n
kotegsom [21]

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

6 0
3 years ago
Other questions:
  • HELP PLEASE
    7·2 answers
  • 1. of the following individuals, who was the most recent to develop information searching tools online? (points : 1) otlet wells
    5·1 answer
  • All the computers in this type of network are connected to two other computers.
    12·1 answer
  • In this website/app what are the points for?
    7·1 answer
  • How many hosts are in each subnet?
    15·1 answer
  • Which line of code will eliminate the element “calculator” from an array of supplies?
    13·1 answer
  • How do you increase the number of tries by one?
    10·1 answer
  • You are considering using Wi-Fi triangulation to track the location of wireless devices within your organization. However, you h
    9·1 answer
  • How to mark a discussion as read on canvas dashboard.
    10·1 answer
  • What are the minimum number of bits an address bus must have in a byte addressable memory system containing only 4 KiB of memory
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!