1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Roman55 [17]
3 years ago
9

20 points for ez question lol

Computers and Technology
2 answers:
V125BC [204]3 years ago
7 0

Answer:

Its A, B, D, F

Explanation:

Smart

slega [8]3 years ago
5 0
I think it might be the third on not certain
You might be interested in
Your laptop normally connects to your home wireless network automatically, but recently you have to connect to the network manua
finlep [7]
Your software is not remembering your password or SSID , maybe your router also has a forget all setting
8 0
3 years ago
What laws are broken when you hack someone?
postnew [5]

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

6 0
3 years ago
State Newton’s second law of motion. Show that Newton’s first and third laws of motion are contained in the second law​
mixer [17]

Answer:

Every physics student learns Newton's three laws of motion. It's tempting to consider that these are three separate and independent laws. That's not so. Both the first and third laws may be mathematically derived from the second law, as we will show.

The fact that the first law may be derived from the second has long been known. The second law,Fnet=ma, tells us that the net (vector sum) of all forces acting on a body is equal to the product of the body's mass and its vector acceleration. When the acceleration is zero, the net force must be zero. This is exactly the content of the first law.

Let's first consider the case of two bodies in contact. Each exerts a force on the other at the interface, or point of contact, where the bodies touch. If that point or interface is treated as a "body" of mass zero, then Newton's second law tells us thatFnet=0a, soFnet= 0. So the net force on a body of zero mass is always zero, whatever forces act upon it. Therefore if only two forces act on a body, they must add to zero, and therefore must be equal size and oppositely directed. This establishes Newton's third law.

Explanation:

Hope this helps

6 0
3 years ago
Do you think people are willing to buy these products? Why?
SSSSS [86.1K]
What products ma’am/sir
3 0
3 years ago
Read 2 more answers
What is generation of computer ​
gladu [14]

What do you mean by generation of computer?

Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k ti
    8·1 answer
  • Consider the scheduling algorithm in the Solaris operating system for time-sharing threads.a. What is the time quantum (in milli
    7·1 answer
  • 1) Open the file DiceSimulation.java attached below. Create a new project on NetBeans called DiceSimulation. Copy the code from
    13·1 answer
  • In checking the digital signature, the verifier ____. a. decrypts the digital signature it received with the supplicant public k
    13·1 answer
  • Please help thank you !!!
    7·2 answers
  • Explain working principle of computer.​
    5·2 answers
  • Use the drop-down menus to match each description to its corresponding term.
    7·1 answer
  • Based on what you know about the Sort and Find functions, return to the database file to determine the answers to the following
    7·2 answers
  • Out of all the social media tools available today, the best tool to start when beginning your social marketing efforts is which
    14·1 answer
  • Does anyone know the answer
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!