1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paul [167]
3 years ago
5

Using complete sentences post a detailed response to the following.

Computers and Technology
2 answers:
kirza4 [7]3 years ago
8 0

Answer:

the guy on top of me is super right follow him

Explanation:

laiz [17]3 years ago
6 0

Answer:

some advantages of top down is that you can start off from what you know and figure out what you need to complete it, advantages to bottom up is that you can make something new . if you are starting something from scratch and you dont know what the end goal might be you would use bottom up but if you already have an idea or the final product of what you want you would go the top down approach.

Explanation: just saying you shouldnt just copy and paste my response but rather pick out what you want to say and use this to complete what ever your working on. hope i helped :)

You might be interested in
Summarize who you believe cyber criminals are, and why?
sergij07 [2.7K]

Answer:

 The cyber criminals are the people that are engaged with getting the data in an unapproved way and furthermore mischief to the association henceforth are considered as cyber criminals.

Cyber criminals are people or groups of individuals who use innovation to committed the malicious exercises on computerized frameworks or systems with the aim of taking the organization data or individual information and producing benefit.

There are many types of cyber criminals that are:

  • Internet stalkers
  • Cyber terrorist
  • Identity thieves

5 0
4 years ago
What is a common indicator of a phishing attempt cyber awareness 2022
vivado [14]

There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.

  • Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.

Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.

Learn more from

brainly.com/question/24069038

7 0
3 years ago
Which magazie can help the public determine the best technology to use
wariber [46]
Well you can read about technology in maybe tec company magazines like apple magazines or samsung magazines on which are best to buy Hope this helps:)
3 0
4 years ago
What shooting position is commonly used when hunting with a shotgun?
amid [387]
Standing well for me I never miss a shot in that position

6 0
4 years ago
Read 2 more answers
For this lab you will write a java program that plays the game poker dice
romanna [79]
<span>All five dice show the same value thats what i think</span>
5 0
3 years ago
Other questions:
  • Under which tab can you find the options for reusing slides from other presentations
    5·1 answer
  • Answer the following questions:
    7·1 answer
  • Negative glue effects
    8·1 answer
  • Assume that sentence is a variable of type String that has been assigned a value. Assume furthermore that this value is a String
    10·1 answer
  • Time (non-statistical) division multiplexing differs from frequency division multiplexing because it:
    5·1 answer
  • You want to receive alerts if unusual activity is detected relating to the Web servers deployed in your perimeter network. What
    7·1 answer
  • Which search phrase is the most effective to find out about the most popular pizza chains worldwide in 2019?
    14·1 answer
  • How to make a website
    15·2 answers
  • What is a smaller loop statement that can appear on the same line of code?
    10·2 answers
  • How do I type in bold on brainly?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!