1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
V125BC [204]
3 years ago
7

Hi, what’s up, im really bored and have nothing to do

Computers and Technology
2 answers:
xenn [34]3 years ago
6 0
Hey, i’m really bored too. Hope this helps
Zanzabum3 years ago
4 0

Answer:

hi no thx

Explanation:

You might be interested in
You can use this type of program to create a new raster image
butalik [34]

Answer:

yes

Explanation:

8 0
3 years ago
What does the hard disk drive do? It stores all of the information on a computer. It controls a computer’s operating system. It
umka21 [38]

The hard disk drive, OR HDD Stores all the information on the computer.

5 0
3 years ago
Read 2 more answers
Fact Pattern: A sales transaction record designed to contain the information presented below. Column Information 1-10 Customer a
ozzi

Answer:

The answer is field check.

Explanation:

The sales transaction record was designed to enter information by range, so the data validation is oriented for range validation and not for a specific logic. In other words, the transaction will check if the information is in a valid range and not if the information is logically valid.

4 0
3 years ago
A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection co
Scorpion4ik [409]

Answer:

a. Password length, password encryption, password complexity

Explanation:

Under this scenario, the best combination would be Password length, password encryption, password complexity. This is because the main security problem is with the user's passwords. Increasing the password length and password complexity makes it nearly impossible for individuals to simply guess the password and gain access, while also making it extremely difficult and time consuming for hackers to use software to discover the password as well. Password excryption would be an extra layer of security as it encrypts the password before storing it into the database, therefore preventing eavesdroppers from seeing the password and leaked info from being used without decryption.

4 0
3 years ago
What is a type of machine-to-human communication?
suter [353]
I don’t know what it’s called but it’s where they can speak by moving there eyes
3 0
3 years ago
Other questions:
  • Queue is the LIFO structure.<br><br> o True<br><br> o False
    8·1 answer
  • Your friend Kayla is starting her own business and asks you whether she should set it up as a P2P network or as a client-server
    13·1 answer
  • What should a career plan include?
    7·1 answer
  • Match each scenario to the absolute value expression that describes it. 1. the distance moved when going backwards five spaces i
    13·2 answers
  • In an array based implementationof a queue a possible solution to dealing with the full condition is to
    14·1 answer
  • What does FLUX do when soldering an electrical joint?
    13·2 answers
  • For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the f
    9·1 answer
  • Help Me<br><br> What are the four types of graphic models?
    10·1 answer
  • A company is acquiring a smaller firm and is setting up a new IT system in order to consolidate the data and assets of the acqui
    11·1 answer
  • Consider the following implementation of a search method:
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!