1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
loris [4]
3 years ago
8

CORRECT ANSWER GETS BRAINLIEST

Computers and Technology
2 answers:
Simora [160]3 years ago
8 0

Answer:

B is true: Neil Armstrong landed on the moon is 1969

A is true: wright brothers flying over 30 minutes in 1905

c is not true

Hope it Helps!

Explanation:

guajiro [1.7K]3 years ago
7 0

I saw that all of them are correct. In 1905, the Wright Brothers flew their plane for 39.5 minutes. In 1969, Neil Armstrong landed on the moon. And the Wright brothers went throughout the U.S and Europe to demonstrate their plane. I hope this helps.

You might be interested in
Damion recently did an update to his computer and added a new video card. After the update, Damion decided that he would like to
postnew [5]
The answer is Secure boot
3 0
3 years ago
What is some effective writing techniques?
scoray [572]
Be persuasive, have form, and know what you are talking about. I would recommend using MELCON.  You can learn more about MELCON with this link.  http://melcon.weebly.com/
3 0
3 years ago
What can you do to stop a computer from repeatedly restarting in a continuous loop?
abruzzese [7]
There are ways to break into the boot cycle of every machine, you could use one of them. Hold down modifier key[s] so that it boots differently or you may get a menu to select boot options.

A specific answer is OS/firmware dependent.
4 0
4 years ago
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
| HELP PLS! C++ Sorting arrays can be performed using either Selection Sort or Insertion Sort or
Sholpan [36]

Answer:

wwhwwwwnlcw lcwl. wl w l. w la a. a. ac aa cw w w w. w. w. w w. ww w. w w w. w w w ww w w. w w ww. w cs s js jw jw kw kw ks jpsbp svkhs ksl oheo

8 0
3 years ago
Other questions:
  • 6.67
    5·1 answer
  • What is an enterprise system
    14·2 answers
  • Why is Abraham called the Father of Believers?
    6·1 answer
  • The term “computer literacy” dates back to what decade? <br> 1960s<br> 1970s<br> 1980s<br> 1990s
    5·1 answer
  • Question 2 (5 points)
    12·1 answer
  • When planning a backup strategy, ideally one needs to prioritize important data and only back up what is absolutely necessary fo
    15·1 answer
  • The Daily Trumpet newspaper accepts classified advertisements in 15 categories such as Apartments for Rent and Pets for Sale. De
    9·1 answer
  • What is a 96.1791 weighted gpa in a 4.0 scale?
    8·1 answer
  • How did the internet originate??​
    12·1 answer
  • Explain approaches of AI​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!