1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yulyashka [42]
3 years ago
13

Decrypt this message: P ht uva h zwf

Computers and Technology
1 answer:
KatRina [158]3 years ago
5 0
Translation: I am a spy
You might be interested in
For each processor find the average capacitive loads.
bagirrra123 [75]
<span>For each processor find the average capacitive loads. Answer use Pefrmon and select CPU Tab (see attachment).</span>

6 0
3 years ago
When initiating a connection how does tcp establish a connection?
Pani-rosa [81]
It uses a 3-way handshake

1. SYN from client to server.
2. SYN-ACK from server to client.
3. ACK from client to the server.

At this point, both client and server have received an acknowledgement of the connection.

4 0
3 years ago
Historically, development of a new technology often:
andrew-mc [135]

Answer:

2. Leads to increases in productivity only once firms learn how to use it.

Explanation:

Technology is an all new or improved way of doing things to enhance effectiveness and efficiency that will lead to increase output. But the new technologies can not improve a business output if they don't grow with the trend of new technologies by updating their knowledge regularly

7 0
3 years ago
Read 2 more answers
The _____ is responsible for managing ip addresses and internet domain names.
TiliK225 [7]
Internet assigned numbers authority (IANA for short).
4 0
3 years ago
Background information: This is an excerpt from a 1433 speech by Emperor Zhu Di.
user100 [1]

Answer:

D. isolationism

Explanation:

6 0
3 years ago
Other questions:
  • What is the difference between EDX and the OCW?
    14·1 answer
  • Excel recognizes an entry as a value if it is a number or it begins with ____
    8·1 answer
  • The ____ command is used to disconnect a datatable object from the database. (
    15·2 answers
  • Write the name of the tab, the command group, and the icon that you need to use to justify
    14·1 answer
  • Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
    12·1 answer
  • If you have an equipment failure while driving on an expressway, you should
    8·1 answer
  • C++Assign to maxSum the max of (numA, numB) PLUS the max of (numY, numZ). Use just one statement. Hint: Call FindMax() twice in
    8·1 answer
  • The ability to use various design software such as Adobe Photoshop, InDesign, and Illustrator would be MOST beneficial to which
    6·1 answer
  • What is the two’s compliment of -95,-122,-111,-57
    9·1 answer
  • ravi met few peoples in a party and was mixing up well those wearing expensives clothing and fair complexion . which factors are
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!