1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldfiish [28.3K]
3 years ago
5

Bored can you talk to me

Computers and Technology
2 answers:
Sedaia [141]3 years ago
7 0
Uhhhhh got any hobbies?
Vedmedyk [2.9K]3 years ago
4 0

Answer:

yeppppppppp.........

You might be interested in
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
What makes an operating system the master controller
IceJOKER [234]

Answer:

An operating system is a master control program, which controls the functions of the computer system as a whole and the running of application programs. All computers do not use the same operating systems.

Explanation:

5 0
3 years ago
Which wireless technology has a typical transfer rate of 1 Mbps to 3 Mbps at distances up to about 10 meters?
PtichkaEL [24]

Answer:

Bluetooth

Explanation:

Bluetooth is a wireless technology which has a transfer rate of 1 Mbps to 3 Mbps that to up to the distance of 10 meters.

In 2000's Bluetooth was used to exchange data without using wires or cables over short distances.

Nowadays it is not used to exchange data.There are more faster technologies present to do that now.But it is still popular to devices like speakers,headphones etc which can be connected by Bluetooth without using wires.

It uses UHF radio waves.

5 0
4 years ago
When a cryptogrpahic system is used to protect data confientiality what takes place?
Alex73 [517]

Answer:

Unauthorized users are prevented from viewing or accessing the resource

5 0
2 years ago
Analizar los componentes de una computadora completa hoy en día comparada con el inicio de la Informática.
scZoUnD [109]

Answer:

Explanation:

Las computadoras que existian en el inicio de la informatica y las que existen ahora tenian los mismos componentes. Estos eran CPU, Placa Madre, RAM, HDD, y tarjeta grafica. Lo que si cambio fueron el velocidad y capacidad. Por ejemplo, en el inicio las Tarjetas de RAM venian como DDR a una velocidad maxima de 133 Mhz con una capacidad de entre 4mb y 8mb. Hoy en dia tenes RAM de DDR5 con una velocidad de 4400 Mhz y de 8gb. Mientras que avanzaba el tiempo los componentes de las computadoras aumentaban en velocidad y capacidad aunque el tamaño bajaba o aumentaba dependiendo del gusto del usario.

8 0
3 years ago
Other questions:
  • Galleons, Sickles, and Knuts are types of coinage from the Harry Potter franchise. Write source code in C++ that converts the nu
    9·1 answer
  • Keyshia adds an image of a triple beam balance and a
    8·1 answer
  • 4. What is the simplest way to permanently get rid of an unwanted file?
    12·1 answer
  • Which king, after finding the decree of Cyrus giving the Jews permission to return and build the Temple, ordered the end of oppo
    11·2 answers
  • Fill in the blank with the correct response.
    5·2 answers
  • Autocad has _____ different ways to use the three point method if drawing and arc
    8·1 answer
  • What is open source software? ​
    8·1 answer
  • Who is this wrong answers only
    7·1 answer
  • You are given an integer N where 0 <= N <= 100, followed by another line of input which has a word W with length L where 1
    6·1 answer
  • 2.9.8 stop light codehs
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!