1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrMuchimi
3 years ago
10

I neeeeeeeeeeeddddddddddddd help plz ppl

Computers and Technology
2 answers:
vlada-n [284]3 years ago
8 0

Answer: white

Explanation: just read the question more carefully ?? It helps me to underline things sometimes. It may help you. Best of luck

WITCHER [35]3 years ago
4 0
Answer is white lol
You might be interested in
If you have a mix of 32-bit and 64-bit versions of windows, which architectures should you add a unattended installation file fo
umka21 [38]
64 bit the likely hood of it failing is much less
4 0
3 years ago
Which type of hacker represents the highest risk to your computer?
Deffense [45]

Answer:

The hacker which represents the highest risk to my computer is the Script Kiddie.

Explanation:

A Script Kiddie cannot make their own programs.

They hack by using existing codes, scripts, web shells etc to access a work station, mutilate webpages etc.

The difference between a Hacker and a Script Kiddie is that a hacker does not need another person's code. They are skilled at writing their own codes which are can be very potent. This level of skill can be difficult to attain except for very bright minds.

The script kid needs very little knowledge of scripts and they are well on their way to causing damage.

Cheers!

4 0
2 years ago
What is the difference of expository and reflexive documentary
spayn [35]
The reflexive documentary mode focuses on the relationship between the filmmaker and the audience. While expository documentaries set up a specific point of view or argument about a subject and a narrator often speaks directly to the viewer.
3 0
2 years ago
A telephone repair technician uses a meter to measure voltage on a phone line. This meter is an example of _____.
frozen [14]
It is an example of hardware.
3 0
3 years ago
Read 2 more answers
Password combined with pin used as an authentication requirement is an example of:
Bingel [31]
...something that the user knows.
4 0
3 years ago
Other questions:
  • A function may return a pointer, but the programmer must ensure that the pointer:
    14·1 answer
  • An extranet is like an intranet except that it allows company employees access to corporate Web sites from the ______
    13·1 answer
  • To create a formula in. . You would first click in one of the cells
    12·2 answers
  • man who is colorblind marries a woman who has normal color vision and is not a carrier of color blindness. If this couple has a
    15·1 answer
  • Always follow the routine "clean up while in use and clean up before keeping it".
    6·1 answer
  • Which are examples of types of audio media that can support a presentation? Check all that apply.
    14·2 answers
  • Que es tarjeta madre resumen porfa
    13·2 answers
  • When locating and correcting accessibility issues for a document, you would click what first?
    11·1 answer
  • What would a system unit that is integrated with the display and keyboard would be considered?
    6·1 answer
  • Computer is a major source of informarion why​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!