1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Greeley [361]
3 years ago
6

Use the drop-down menus to answer the questions.

Computers and Technology
1 answer:
Sonja [21]3 years ago
6 0

Answer:

they are right up there i just need the points

Explanation:

You might be interested in
A document created by the scriptwriter that contains general information about a program is called _____.
denpristay [2]
It is called the, "Program Proposal".
7 0
2 years ago
What is another word for: a location in memory that contains a value? A. integer B. Boolean C. variable D. float PLEASE HELP URG
german

Answer:

A

Explanation:

Integer because it contains digits that can undergo calculation within the memory

5 0
2 years ago
When it comes to credit scores, why is having a
inessss [21]

Answer:

credit karma

Explanation:

karma is -69

6 0
3 years ago
All parking revenue comes from a home teams games? True or false
Greeley [361]

Answer:

False

Explanation:

False, all parking revenues do not come from home team games. The home team refers to a team that plays on its ground. Parking Revenue refers to the revenue earned from the rental of parking space.

Stadium owners can generate more revenue from parking and concessions by increasing the use of their venue. Stadium parking is also one of the sources of income.

3 0
2 years ago
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
KatRina [158]

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

7 0
3 years ago
Other questions:
  • The ________ is(are) used to display information on the computer's screen.
    13·1 answer
  • When the packet leaves the router, which source and destination ip addresses will be contained in the packet?
    9·1 answer
  • On most desktop computers, most of the USB ports are on the back of the computer case. Generally, you'll want to connect your mo
    13·1 answer
  • You have just changed the system time within your computer's BIOS. You choose to save the settings upon exit. What happens next
    14·2 answers
  • Different video files and ______ can cause compatibility issues to arise between computer systems.
    8·1 answer
  • CMS is a content management system that collects, organization, publishes, and manages creative content. Right...?
    9·1 answer
  • What is a third variable condition that could create the following correlation?
    10·2 answers
  • True or False: The major advantage of Arrays over ArrayLists in Java is the fact that while ArrayLists are fixed in size, an Arr
    15·1 answer
  • Match the TCP/IP Layer to a problem that can happen there.
    8·1 answer
  • Can anyone figure this out???? I need help ASAP!
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!