1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nookie1986 [14]
2 years ago
14

That's my email address​

Computers and Technology
1 answer:
rodikova [14]2 years ago
3 0
Okay then that’s pretty cool
You might be interested in
Which of the following is most likely to be considered plagiarism? a. Intentionally reporting the results of inaccurate statisti
Svetlanka [38]

Answer:

c.

Explanation:

Plagiarism refers to the act of stealing another person's thought, ideas, or expressions. Therefore it can be said that out of all the answers provided the one that is most likely to be considered plagiarism would be using materials from a source without proper citation. This is because you are using another individual's work and not giving them credit for having created that work, instead you are taking credit for it by not citing the actual author.

4 0
3 years ago
. Hackers generally disguise their IP address. True False
maw [93]
I think that's true.
If they didn't they could be easily tracked by the police.
4 0
3 years ago
Which of the following would an NSA professional most likely need?
lutik1710 [3]

Answer:

B.a high school diploma and some training

Explanation:

Undoubtedly, NSA professional requires limited education, and a high school diploma is enough for them. However, they will need some training related to security services as well. and only then they will be able to work as an NSA professional. Hence, having only a high school diploma is not enough, and the certificate will also not work. However, they also do not need a bachelor's degree. And they definitely need a high school diploma and some training. That is certainly going to be enough for becoming an NSA professional.

6 0
3 years ago
Read 2 more answers
what is the worst-case big o running time for finding the maximum value in an array of size n by scanning from left to right and
Aleksandr-060686 [28]

Answer:

spanish

Explanation:

no ingles a me pisquen spanish soy tu amigos teacher

6 0
1 year ago
A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t
kondor19780726 [428]

The Network Mapper (Nmap) commands that would be useful on this test network are:

  1. nmap xxx.xxx.x.x -p
  2. nmap xxx.xxx.x.x -A

<h3>What is a penetration test?</h3>

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities in the following:

  • Operating system
  • Web software
  • Host device
  • Network

This ultimately implies that, a penetration test avails an tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the system.

<h3>The Network Mapper (Nmap) commands.</h3>

In this scenario, the Network Mapper (Nmap) commands that would be useful on this test network are:

  1. nmap xxx.xxx.x.x -p
  2. nmap xxx.xxx.x.x -A

Read more on penetration test here: brainly.com/question/25813524

6 0
2 years ago
Other questions:
  • Scenes that are shot outside are known as
    9·1 answer
  • A​ _______ helps us understand the nature of the distribution of a data set.
    10·1 answer
  • A(n) _____ measures the ability to juggle a variety of demands, as in a manager's job where the candidate is presented with simu
    8·1 answer
  • Describe the best way to deal with a difficult co-worker?
    13·2 answers
  • Explain how technology is related to human needs and wants?
    13·1 answer
  • ______ are used to store all the data in a database.
    7·1 answer
  • How would you describe<br> "analogous color harmony" to a six year old?
    13·1 answer
  • 1. Write a 400-500 word research report about Burke High School.
    6·1 answer
  • When you create a new database using --------- , the database includes prebuilt tables and forms which you can populate with dat
    15·1 answer
  • You are planning to depart on a flight from area 2 to area 4 in 12 hours. What weather is forecast to occur along your route?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!