1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nordsb [41]
3 years ago
9

Which details in paragraphs 1-5 contrast with your experience and expectations?

Computers and Technology
1 answer:
vichka [17]3 years ago
7 0

Answer:

among us

Explanation:

You might be interested in
True or False
krok68 [10]

I think that the answer is false. But I'm not sure.Let meknow if I'm right.

8 0
3 years ago
Read 2 more answers
I will mark brainalist! ​
netineya [11]

Answer:

I would say

1) Weather Station

2) (word missing)

3) Robot perihen devices

4) Bit

5) Primary Key

6) Algorithim

7) Flow Chart

8) Table Wizard

9) Design View

10) SIMS

5 0
3 years ago
Help need urgently answer ​
skad [1K]

Answer:

Explanation:

b

6 0
3 years ago
Read 2 more answers
What effect would excluding quotation marks from a search phrase have?
n200080 [17]

Answer: C

 it would broaden the search

Explanation:

Placing quotation marks around a search term or phrase limits your search to that exact term or phrase. Without the quotes, your search engine may return all results that contain each separate word. Placing AND between your keywords will return results that only include both or all your keywords.

4 0
3 years ago
Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes su
andrew11 [14]

Answer:

Network Sniffing

Explanation:

Network sniffing is basically know to be the act of tapping into network traffics and modifying unsafe requests for both good and bad purposes.Network sniffing is also known as Packet Sniffing which means as its name implies; sniffing chunks of packets on a network. This kind of attack mostly arise when a user exposes their device to unsecured Wi-Fi networks.So using ethernet with softwares (Network monitoring softwares) I think would paly an important role in curbing such attacks.

4 0
2 years ago
Other questions:
  • CompX Inc. is an online retailer of electronic products, including laptops and tablets. The company is known for its unique appr
    15·1 answer
  • Can someone help me with these questions on linear dimensions pls
    11·2 answers
  • Your sister wants to purchase Microsoft Office 2013 for her new laptop. She doesn't want to pay for a subscription, and she want
    12·1 answer
  • We can log on to computer or to network through s creen<br>​
    7·1 answer
  • Label 14 parts of the inside of a computer
    6·1 answer
  • Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times
    8·1 answer
  • Everytime my daughter tries to ask for an app, or a money thing inside an app.. The request won't go through. Anybody know how t
    12·1 answer
  • Which statement describe the advantages of using XML? more than one answer can be correct
    9·1 answer
  • What are like arms surrounding all the other code blocks?
    11·2 answers
  • Do you know the energy unit question?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!