1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
4vir4ik [10]
3 years ago
13

7.2 need help plzs 15 points

Computers and Technology
1 answer:
Natalka [10]3 years ago
3 0
So you have to read it and make it a pronoun
You might be interested in
Write a function transpose(matrix) that returns the transpose of the input matrix, which is represented as a list of lists. Reca
mariarad [96]

Answer:you eat

Explanation:yea

4 0
2 years ago
A startup is developing a new web browser with a focus on accessibility for visually impaired users. The startup founder is cons
gavmur [86]

Answer:

A license that allows developers to change and share the source

code of the licensed software

Explanation:

i learned this, btw brainly stop removing my answers

7 0
2 years ago
You need to open the negative screw on the ceiling fan,what driver should you use?​
ELEN [110]

Answer:

flat screw driver

because if the screw is negative then you will need a flat screw driver

8 0
3 years ago
Joel has left his computer unattended while answering a phone call . A TV repairer in his house tries to surf through the applic
Triss [41]
<span>Joel is a victim of a security breech. By leaving his computer unattended and not locked, he allowed for another person to use his credentials to access (or attempt) to access information that would otherwise be restricted to him. The fact that the unauthorized person did not find the information he was seeking does not minimize the risk.</span>
5 0
3 years ago
Which of the following is NOT a reason to use cryptography?
Mars2501 [29]

Cryptography is not a reason to use when posting photos on a public social media website.

Cryptography is the use of certain techniques that help protect important and personal information from being accessed by other parties. This technological practice or method allows a person to send sensitive or personal information over the internet without risking any "leak" of information.

  • Cryptography literally means "hidden writing", which is what the method is all about.
  • It presents a safe and secure way of sending or passing information, even personal or sensitive ones.
  • This technological method enables businesses and other companies as well as individuals to procure and send information without fearing for any loss of their information.
  • Cryptography is mainly used in the military, secret operations, businesses, or even in maintaining one's passwords while using social media platforms or submitting a password on a website.
  • One reason to not use it is when posting photos on social media websites as the website is to be used by the web world and may/can be accessed by everyone around the world.

Cryptography not only allows a person to maintain certain privacy and security but also help the smooth functioning of businesses and other national security works. Thus, cryptography is the "security" of individuals in the 'internet world'.

Learn more about cryptography here:

brainly.com/question/88001

5 0
3 years ago
Read 2 more answers
Other questions:
  • One of the disadvantages of cable technology is that:
    7·1 answer
  • If you need to show slides on a wide-screen monitor, you might change their size to: Select one: a. Onscreen Show (16:9) b. Onsc
    11·1 answer
  • Why would a designer choose to use an isometric sketch rather than a perspective sketch to share their idea with a design team m
    14·1 answer
  • The Quick Access Toolbar cannot be customized and have extra commands added to it
    5·1 answer
  • Prove each statement using a proof by exhaustion. For every integer n such that 0 lessthanorequalto n &lt; 3, (n + 1)^2 &gt; n^3
    9·1 answer
  • Which term is used to identify the connection of computers that are physically close to one another?
    8·2 answers
  • Witch of the following is a valid why a scientist might a scientific theory
    13·1 answer
  • Can include the 5-tuple information, which is the source and destination ip addresses, source and destination ports, protocols i
    9·1 answer
  • What is output if the user enters -5?
    12·2 answers
  • In order to get the maximum functionality out of a device that is plugged in, a user should download the specific ___ for that d
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!