1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
atroni [7]
3 years ago
10

Just took a test and I got 5 wrong and I wanted to know the correct answers

Computers and Technology
1 answer:
baherus [9]3 years ago
7 0

Answer:

I need the pic

Explanation:

You might be interested in
Web beacons are tiny, invisible software programs hidden in email messages and web pages that are used to track and report a use
Umnica [9.8K]

Answer:

The answer is "True".

Explanation:

The web beacons are one of the different techniques, that are used on web pages and emails, to check whether a user has access to some unobtrusively. It is a line, that is often invisible, and typically does not exceed 1 pixel.

  • It is usually used with cookies.
  • It is also known as a small graph, which generates a request to the server for tracking service.
7 0
3 years ago
Identify which of these types of sampling is​ used: random,​ systematic, convenience,​ stratified, or cluster. To determine her
Zarrin [17]

Answer:

B.

Explanation:

Based on the sampling methods provided in regards to the question it can be said that the method being used is called Simple Random. This refers to dividing the population into different group which are then chosen at random, giving each group an equal chance of getting chosen. Which is exactly what is going on in this scenario, as the day is divided into three parts and her mood is measured randomly during each part of the day.

6 0
4 years ago
WEP (Wired Equivalent Privacy) has a design flaw which allowed attackers to break its encryption codes, WPA2 ( 2) has not suffer
ad-work [718]

Answer:

The answer is "True"

Explanation:

In computer science, the IEEE project uses this security project, it is designed for wireless network, that provides the same level security and the data encryption for cable network also.

  • It provides protects in wireless transmissions from both the poking and collecting information of packets.  
  • It also lets hackers crack their computer, that's why the given statement is true.
3 0
3 years ago
Can Anybody Answer This For Me ?
AlladinOne [14]

Answer:

I'm pretty sure its 3 only (c) III only gimme brainliest

3 0
4 years ago
Input parts of computer
Lana71 [14]
Keyborad,mouse,light pen, touch pad, microphone, etc
8 0
4 years ago
Read 2 more answers
Other questions:
  • 5. Which of the following is a Windows feature that allows you to temporarily store text?
    13·2 answers
  • The space force enhancement function concerned with providing data on meteorological, oceanographic, and space environmental fac
    12·1 answer
  • Write a function that will alphabetize a string WITHOUT using the sort function :
    7·1 answer
  • In a study on software license infringement, those from United States were significantly more permissive than those from the Net
    15·1 answer
  • What is an XML-based open standard for exchanging authentication and authorization information and is commonly used for web appl
    12·1 answer
  • Create the logic for a program that prompts a user for 12 numbers and stores them in an array. Pass the array to a method that r
    8·1 answer
  • Which type of file can be opened directly into Excel?
    15·1 answer
  • Question 1 (1 point)
    9·2 answers
  • In your own words, what is Cryptocurrency?
    15·2 answers
  • LCD, EL and gas-plasma are types of flat-panel screens.<br> True<br> False
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!