1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masya89 [10]
3 years ago
15

DECIPHER AND SOLVE THIS SCC:R D YJOTE VP=GPIMFRT

Computers and Technology
1 answer:
blagie [28]3 years ago
6 0
Um.... alrighty then
You might be interested in
Any anime weebs wanna talk
erastova [34]

Answer:

Sowwy, it's not Me!

The Bermuda Triangle, also known as the Devil's Triangle, is a loosely defined region in the western part of the North Atlantic Ocean where a number of aircraft and ships are said to have disappeared under mysterious circumstances. Most reputable sources dismiss the idea that there is any mystery.[1][2][3]

Bermuda Triangle

Devil's Triangle

6 0
3 years ago
Read 2 more answers
What is required to display content on transparencies?
VladimirAG [237]
An overhead projector is required to display content on transparencies. A transparency is a thin sheet of plastic in which light is reflected upon to display content.The light source emits light towards the transparency and then the image is displayed on the wall. Usually, this light source comes from below and lights upward and so the content is depicted above or overhead.
6 0
3 years ago
The ________ identifies staff reaction and response times as well as inefficiencies or previously unidentified vulnerabilities.
Paraphin [41]

Answer:

simulation test

Explanation:

7 0
3 years ago
What is a programming method that provides for interactive modules to a website?
Veseljchak [2.6K]

Answer:

Java?

Explanation:

8 0
4 years ago
Which of the following scan only works if operating system’s TCP/IP implementation is based on RFC 793?
Shkiper50 [21]

Answer:NULL Scan

Explanation:RFC 793(Request for comments) is a type of RFC command labeled with the number 793 which can operate with the TCP protocol.They are sort of document form which is from IETF( Internet Engineering Task Force ).

The null scan is scanning protocol used by legal as well as illegal hackers for working in the transfer control protocol architecture. It is used for the identification of the the ports and holes in TCP servers.they can also have the negative impact if used by the illegal hackers.

5 0
3 years ago
Other questions:
  • HELP AS SOON IS A UNIT TEST WILL GIVE BRAINLIEST
    9·2 answers
  • Computer with a domain name is called a
    7·1 answer
  • Please help me complete this task for ICT! Its about Hardware and Software
    12·1 answer
  • When he takes a picture, Simon freezes an action without blurring it, to show movement. Which type of photographer is he?
    9·2 answers
  • Some of the users in your company create and delete so many files that they have problems with fragmented disks. Which of the fo
    5·1 answer
  • Which questions should you ask yourself when performing research online?
    9·1 answer
  • What computer is designed for particular application​
    13·1 answer
  • Describe some things that this person might say that might cause you to NOT hire them. Explain.
    6·1 answer
  • A program similar to mtr, ____, is available as a command-line utility in Windows operating systems.
    12·1 answer
  • Redesign the cover of science textbook using at least two different graphics​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!