1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhannawk [14.2K]
3 years ago
15

The following numbers are sorted in which way: 10,20,30,40?

Computers and Technology
2 answers:
Bas_tet [7]3 years ago
8 0

The numbers are sorted by tens

vichka [17]3 years ago
7 0

ascending order

Explanation:

You might be interested in
Felicity wants to capture the attention of the regular subway commuters in her area though her print advertisements​
mel-nik [20]

Answer: billboard

Explanation:

Plato answer

8 0
3 years ago
An intruder can wreak havoc on a network by simply plugging in an infected USB flash drive.
Bas_tet [7]

Answer:

A. True

Explanation:

1. I took the test

2. Flash drive ports are connected to the rest of the computer, so putting in an infected flash drive into the port will cause the bug to spread throughout the whole device.

3 0
2 years ago
This is Microsoft Word. ONLY RIGHT ANSWERS. 100 points
Anettt [7]

Answer:

start with what you know

Explanation:

5 0
3 years ago
Read 2 more answers
Computer network reduce the cost true or false​
kogti [31]
True... computer network reduces cost
7 0
2 years ago
What do you call when a hacker users multiple guest computers to crack a password?
azamat

Answer: Botnet

Explanation:

Botnet is the process when a hacker user uses multiple guest computer to crack a password. Basically, hackers use botnet for performing the distributed denial of services attack in the network.

It also steal the data and allowed attacker to approach its connection and access its device.

Botnet word is the combination of robot and network and botnet can be controlled by using the command and control software.

6 0
3 years ago
Other questions:
  • Sandie is writing a report for her environmental science class. She has asked her older sister who is away at college to proof h
    13·2 answers
  • What should you do if your computer keeps shutting down while working?
    9·2 answers
  • You can combine the algorithms for converting between infix to postfix and for evaluating postfix to evaluate an infix expressio
    13·1 answer
  • Carbon copy others who are..
    14·2 answers
  • Define additional characteristics such as font weight or style for an html tag
    5·1 answer
  • Relation between training and occupation with examples in points . Plz tell fast<br> ​
    5·1 answer
  • A bluetooth device in ____ mode is part of the piconet but is in a low-power state.
    8·1 answer
  • A ________ database state is one in which all data integrity constraints are satisfied
    15·2 answers
  • Are you allowed to copy and paste answers on brainy to give answers to other people?
    5·2 answers
  • Assignment 3: chabot<br>​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!