1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hram777 [196]
2 years ago
6

Which one of these do you need to become president of the US ?

Computers and Technology
2 answers:
gladu [14]2 years ago
7 0

Answer:

Tbh i dont even know

Explanation:

I had who i wanted to become president but i don't even know anymore

Yuki888 [10]2 years ago
7 0

Answer:

One of your parents have to be a U.S citizen you have to be at least 35 years of age

You might be interested in
NARIO 1
Alika [10]

Answer:

85%

Explanation:

8:00 a.m - 1:00 pm = 5 hours

Sunday - Wednesday = 4 days

Total scheduled hours = 5 * 4 = 20 hours

Hours in adherence :

Sunday to Tuesday (3 * 5 hours) = 15 hours

Wednesday : (11:00 a.m - 1:00 a.m) = 2 hours

Total hours adhered = (15 + 2) = 17 hours

Commitment adherence percentage :

(Total hours adhered / total scheduled hours) * 100%

(17 / 20) * 100%

0.85 * 100

= 85%

5 0
2 years ago
How is an image represented
Sonja [21]
With a sertain address.
4 0
2 years ago
Read 2 more answers
Describe the attacks in wireless networks that are more serious com pared to wired network
Julli [10]

Answer:

Both types of attacks can be devastating.

Explanation:

Attacks Wireless Networks are sometimes considered more serious because they can be attacked from remote locations. One of the more serious attacks would be against commercial airplanes. A wireless hack and system shutdown of a commercial aircraft can be catastrophic, and can all be done wireless. While a Wired Network attack can cause catastrophic events they need to be attacked from within the location of the network which is usually guarded by security personnel as well as system firewalls.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
A company wishes to begin the process of implementing a multi-party system and is looking for other companies with similar inter
Andre45 [30]

If a company wishes to begin the process of implementing a multiparty system using block-chain, this provides Trust among the organizations.

<h3>What is a block chain?</h3>

A block chain is a listing of records referred to as blocks. Cryptography is used to link the blocks collectively.

Beginning a process of implementing a multi-party system provides trust among the organization, and not ownership, intent or uniqueness.

Read more about <em>systems </em>here:

brainly.com/question/14364696

7 0
2 years ago
Network footprinting is used to ______________________. Group of answer choices test for vulnerabilities determine what services
Rufina [12.5K]

Answer:

Network footprinting is used to ______________________.

test for vulnerabilities.

Explanation:

Network footprinting is the technique that reveals system vulnerabilities and how the vulnerabilities can be exploited.  Hackers use footprinting to determine the location and objective of a network.  The discovery of this specific information about the organization can lead to the hacking of the network.  Network footprinting relies on loopholes to create vulnerabilities in a network and plans for cyberattack.

3 0
2 years ago
Other questions:
  • Jason wants to open a program with the command prompt window. Which command should he type in the Run dialog box to open the com
    10·1 answer
  • What is the body of scientific knowledge based on?
    7·2 answers
  • What is the main storage device where the computer stores data?
    15·1 answer
  • Describe shortly about the following Linux directories and theirpurpose,1. lib2. etc3. Boot4. Root5. home
    6·1 answer
  • Choose the list of the best uses for word processing software.
    8·1 answer
  • What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
    7·1 answer
  • Match each type of software license with the appropriate definition.
    11·1 answer
  • What is your personal definition of life? How do you appreciate life?​
    10·1 answer
  • You are trying to connect a new USB device to your computer. You install the driver and then connect the device to an open USB
    10·1 answer
  • Date Time Manipulation Exploration If you start from Jan 1st, 1757, and repeatedly add 8 days, until you hit 1800, how many time
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!