1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nezavi [6.7K]
3 years ago
15

Send me the answers​

Computers and Technology
1 answer:
Ronch [10]3 years ago
5 0

Answer:

???...................???

You might be interested in
WHAT IS ONE WAY A PIVOTTABLE COULD COMBINE THE FOLLOWING DATA
Gemiola [76]

Answer: You sort table data with commands that are displayed when you click a header arrow button. Hope it help's :D

7 0
3 years ago
Importance of project risk management
kkurt [141]
You must spread your risks out like don’t put all your eggs in one basket... don’t rely on on thing because is it goes downhill you have no backup
5 0
4 years ago
There are various risks from attacks on wi-fi networks. These include all of the following except _____.
Mariulka [41]

There are various risks from attacks on wi-fi networks. These include all of the following except creating option d: malware.

<h3>What is malware?</h3>

This is said to be any program or file that purposefully hurts a computer, network, or server is known as malware, or malicious software.

Note that Computer viruses, worms, as well as Trojan horses, ransomware, and spyware are said to be examples of malware.

Lastly, Malware, often seen as malicious software, is a general word for any program or piece of code written with the intention of causing harm to a computer, network, or server.

Learn more about malware from

brainly.com/question/399317
#SPJ1

See options below

Blackbox

Acting

Miracle

Malware

5 0
1 year ago
Question 2: Did every packet arrive in the correct order? Describe what went wrong and whether your partner was able to read the
Gemiola [76]

Answer:

No, the packets did not arrive in the right order but the TCP protocol reordered the packets. The transmission took a while, but the message was finally delivered.

Explanation:

Packets are chunks of data from a data source or message transmitted from one computer device to another. Protocols like TCP or transmission control protocol and UDP (user datagram protocol) are used for data transfer, with TCP as the more reliable protocol (it checks for errors, retransmit lost packets, and reorders received packets in the destination device) and slow protocol.

5 0
4 years ago
WILL UPVOTE ALL.
scoundrel [369]
Ummmmm....... i would say true, hope that helped, if not im super sorry :)
7 0
3 years ago
Other questions:
  • Give the Linux bash pipelined command that would take the output of the "cat /etc/passwd" command (that lists the contents of th
    5·1 answer
  • What are the benefits of using disk cleanup as part of regular maintenance on a computer​
    8·1 answer
  • In a virtual memory system, each process must have its own page table.(True or False?)
    13·1 answer
  • What factors should you consider when buying a hard drive?
    8·1 answer
  • a) Before writing any code, you should go through a design process. Try to do so carefully – either follow a top-down approach,
    15·1 answer
  • As each layer of the OSI model adds its encapsulation header and/or footer, the ______ gets larger until it reaches the physical
    8·1 answer
  • What is the relevance of Address Block?​
    13·1 answer
  • Write a program that uses nested loops to collect data and calculate the average rainfall over a period of years. The program sh
    6·1 answer
  • Write a c++ program which has array in fifteen element sort the array by selection the search for in element using binary search
    14·1 answer
  • How many devices can I sign in on with my one Brainly account?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!