1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Monica [59]
3 years ago
13

PLEASE HELP 17 POINTS AND ILL MARK BRAINLIEST IF CORRECT , DONT GUESS

Computers and Technology
1 answer:
Lorico [155]3 years ago
6 0

Answer:

A is the only answer that makes sense, although it is explained very poorly.

You might be interested in
Whats the difference between firms that provide services and firms that sell products?
Sunny_sXe [5.5K]
One is for entertainment (e.g. movies) and one is an advertisement/commercial
4 0
3 years ago
Read 2 more answers
Astrid’s computer screen suddenly says that all files are now locked until money is transferred to a specific account, at which
monitta

Answer:

Your answer would likely be ii

Explanation:

Most of the time these types of programs will behave like the one stated. They normally want you to pay with Bitcoin but it can vary like with Ethereum or really anything that's in the stock market! But it normally consists of Bitcoin

6 0
3 years ago
Juhfvehrfwhedfhwkefhkujhiuyuiyuiyiyh
maw [93]

Answer:

blah

blah

blah..⁉️

Explanation:

juhfvehrfwhedfhwkefhkujhiuyuiyuiyiyh

⁉️

8 0
3 years ago
List 5 kinds of acquaintances who told Debbie Fields would fail?<br><br> right answer only
Mamont248 [21]
<span><span>1.her husband’s business acquaintances2.Debbi’s mother3.her in-laws4.her friends 5.fellow students at Los Altos Junior College </span>At age 20, Debbi Fields always loved baking cookies and decided that she thought about starting a business. Her family and friends argued that the business would fail but Debbi managed to get a loan. <span>
</span></span>
3 0
4 years ago
Read 2 more answers
A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of th
Sindrei [870]

Answer:

The appropriate response will be "Public key".

Explanation:

  • A public key would be created in something like such key encryption cryptography consisting incorporates asymmetric encryption of the keys algorithms.
  • Those same keys have been utilized to transform a document to even such an unintelligible form. Decryption consists done using only a separate, however corresponding, secret address or private key.
6 0
3 years ago
Other questions:
  • How do i know if i got flash installed onchrome
    5·1 answer
  • To help determine which technology to use, Raul creates a table to help him compare the pros and cons of his choices. What part
    15·1 answer
  • What is encyclopedia. Com considered to be?
    14·1 answer
  • A client is asking for a printing solution that will print three sheets of paper with identical information on each page with a
    13·1 answer
  • A ______ is a personal computer which stays in one location (e.g. office) due to its larger form factor.
    5·1 answer
  • Write a static method reOrder56(int[] nums) that return an array that contains exactly the same numbers as the given array, but
    10·1 answer
  • HELPPP
    5·1 answer
  • Click print to publish your post in a blog true or false.​
    5·2 answers
  • The four main disabilities or impairments that computers can modify are for
    9·1 answer
  • Outline the steps for logging into E-mail account​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!