1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kap26 [50]
3 years ago
7

Please help thank you !!!

Computers and Technology
2 answers:
Volgvan3 years ago
8 0

Answer:

The answer is C

Explanation:

The answer is C

s2008m [1.1K]3 years ago
5 0

hi idont see your question unfortunattely sorry

You might be interested in
How do you know how much space is on the computer
Vladimir79 [104]
Depending on which computer you have you can go into settings and check the data tab or it should be on the box how much it comes with :)
5 0
4 years ago
Read 2 more answers
In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer
lara31 [8.8K]

Answer:

a. backdoor

backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

6 0
3 years ago
Read 2 more answers
How do you get Brainliest on a question?
Mama L [17]

Answer:

yes that is the way things work and I think for the answer to be marked brainiest there must be two answers that were posted.

Explanation:

Hope this helps:)

5 0
3 years ago
Read 2 more answers
Is the PS5 worth it?
ratelena [41]
Yes it is worth it!!!!!!!!!!!
3 0
3 years ago
Read 2 more answers
Does anyone want to play nitro type with me for my typing class I put 100 points into this so If you put link or random stuff I
Tju [1.3M]

Answer:

okay

so what is it what is your question..

7 0
3 years ago
Other questions:
  • Given positive integer numInsects, write a while loop that prints that number doubled without reaching 200. Follow each number w
    8·1 answer
  • What is an (CR) Optical character recognition?
    13·2 answers
  • When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?
    12·1 answer
  • If a full disk encryption (FDE) password is forgotten, what can be incorporated to securely store the encryption key to unlock t
    13·1 answer
  • Write a function called matches that takes two int arrays and their respective sizes, and returns the number of consecutive valu
    6·1 answer
  • Way to minimize technical problems with your computer
    6·1 answer
  • Jamie is preparing a presentation on his laptop for his college annual event. He inserts audio and video files into the presenta
    11·2 answers
  • What two items must be given to the socket function in order to create a socket object? A) The socket type that will be used. B)
    10·1 answer
  • Online transaction processing (OLTP) and online analytical processing (OLAP) are similar MIS strategies used to help with busine
    9·1 answer
  • Viết thuật toán và chương trình: Tính tổng:<br> S=1+2+...i
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!