1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
3 years ago
12

¿los equipos de computo pueden ser vulnerables?

Computers and Technology
1 answer:
ss7ja [257]3 years ago
6 0

Answer:

Si puede

Explanation: Yes it can

You might be interested in
What are the buisness debts called?
inessss [21]
Business debts are called:
B. Liabilities
4 0
4 years ago
Im having trouble with PLC subject. How to make this ladder diagram?
ozzi
Did you try google? Probably it will help u
6 0
3 years ago
To adjust the height of cells, position the pointer over one of the dividing lines between cells. When the pointer changes to th
Sergio [31]

Answer:

double arrow shape

Explanation:

To adjust the height of the cells

1. We have to position the mouse pointer over one of the column line or the one of the row line.

2. As we place the pointer between the dividing lines, the cursor of the mouse pointer change from singe bold arrow to double arrow symbol.

3.Now press or click the left mouse button and drag the dividing lines of the   cells to the desired position to have the required width or height of the cell.

5 0
4 years ago
What are the six things you will learn this week on Scratch?
notka56 [123]

Answer:

1 You can learn to draw

2 You can learn to code

3 You can learn to make a thumbnail

4 You can learn how to follow yourself

5 You can learn  to remix your own projects

6 You can learn how to make a featured project you've never shared

Explanation:

8 0
3 years ago
A digital forensic analyst examines the original digital source (e.g. computer, flash drive, backup tape) suspected of being inv
mel-nik [20]

Answer: True

Explanation:

Digital forensic analysts are the people who examine digital devices such as cameras, mobile phones and computers in order to get evidence of crime.

The evidence gotten by them can then be used to provide support to criminal investigations and can also be given to the intelligence agencies. Their function is to get back and safeguard the digital data which are related to cybercrime investigations as well as criminal investigations.

6 0
3 years ago
Other questions:
  • Assume that a two-dimensional rectangular array of integers called matrix has been declared with six rows and eight columns. Wri
    13·1 answer
  • Create 3–5 questions about your data that can be answered by sorting and filtering the database.
    8·1 answer
  • Write the proghrams for the following:
    13·1 answer
  • What would you have to know about the pivot columns in an augmented matrix in order to know that the linear system is consistent
    13·1 answer
  • Should the use of hacktivists by a country against enemy organizations be considered an act of war? Why or why not? How about th
    8·1 answer
  • E-commerce is the demand of modern society both in terms of time and money​
    7·1 answer
  • The <br> is an image at the top of the page that includes the title.
    14·1 answer
  • In object-oriented analysis, an object is a member of a(n) _____, which is a collection of similar objects.
    11·1 answer
  • Write a static method named isSorted that takes an array of real numbers as a parameter and that returns true if the list is in
    5·1 answer
  • A technician is testing a connector in a circuit with a voltmeter. With the power on in the circuit, the meter reads 12 volts wh
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!