1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilya [14]
3 years ago
7

Select the correct answer from each drop-down menu.

Computers and Technology
1 answer:
xenn [34]3 years ago
4 0

Answer:

Siftable are small independent computer that are capable of BLANK (graphics audio video)

You might be interested in
One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or
Sindrei [870]

Answer:

A) hacktivist

Explanation:

According to my research on cyber security attacks, I can say that based on the information provided within the question the form on online vandalism being defined is called hacktivist operations. These are activists who hack into government or organizational systems in order to protest their policies or actions, and by doing so can severely damage their systems.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
Read 2 more answers
Identify three errors in this HTML code snippet:
Kazeer [188]

I have annotated the errors in the picture.

<em />

<em>Hope this helps :)</em>

5 0
2 years ago
Read 2 more answers
List two items that are required to make a text file into a bash script.
Olenka [21]

Answer:

Explanation:

First a header is needed indicating which bash will be used (sh, zsh, bash, etc.), then it is necessary to change the file extension so that the system recognizes it as an executable file and no longer as text

6 0
4 years ago
What is block chain?
LuckyWell [14K]

Answer:

Block Chain is a system of recording information that makes it difficult or impossible to change, hack, or cheat the system.

A blockchain is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain.

Hope this helps.

x

6 0
3 years ago
Read 2 more answers
The IP address is a _____ bit number.
Anika [276]

Answer: 32 bit number

Explanation:

 The IP address basically contain 32 bit number as due to the growth of the various internet application and depletion of the IPV4 address. The IP address basically provide two main function is that:

  • The location addressing
  • The network interface identification  

The IP address are basically available in the human readable format. The IPV6 is the new version of the IP address and its uses 128 bits.  

3 0
3 years ago
Other questions:
  • Internet control message protocol (icmp) is a method of ip address assignment that uses an alternate, public ip address to hide
    7·1 answer
  • . How is a form used?
    10·1 answer
  • The syntax for accessing a class (struct) member using the operator -&gt; is ____.
    15·2 answers
  • you are concerned with security at your company and want to implement a technology that requires no configuring on the users sid
    15·1 answer
  • URLs are directions that browsers follow in order to find specific web page files. What is the first part of the URL that is the
    14·1 answer
  • Giving Brainliest IFFF CORRECT
    9·1 answer
  • Jim has documented a use case that describes the functionality of a system as "To compute gross pay, multiply the hours worked t
    11·1 answer
  • Which file system is designed to verify and autocorrect data faults on the volume without having to bring the volume down for ma
    11·1 answer
  • What is the first priority when building or using vex robots
    10·2 answers
  • 19. Fatigue can help improve your reaction time.<br> False<br> O True
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!