1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
9

Need help please asap

Computers and Technology
1 answer:
Nitella [24]3 years ago
6 0

Answer:

Its C that is the answer hahahahha

You might be interested in
A standard for compressing music into computer files that can be easily exchanged on the Internet is called a(n) ______. A. musi
Sophie [7]

Answer:

The correct answer is E. MP3

Explanation:

MP3 (formally MPEG-1 Audio Layer III or MPEG-2 Audio Layer III) is a coding format for digital audio. MP3 as a file format commonly designates files containing an elementary stream of MPEG-1 audio and video encoded data, without other complexities of the MP3 standard. The MP3 format makes it possible to compress a song into a file small enough to be uploaded, downloaded, emailed, and stored on a hard drive.

4 0
4 years ago
Which science topics would be suited for this organizational aid? Check all that apply.
IrinaVladis [17]

Answer:

Its A and E

Explanation:

3 0
3 years ago
Which of the following are ways that
Viefleur [7K]

Answer:

A and b

Explanation:

3 0
3 years ago
Jack, a skillful hacker targeted a major banking services firm located in Japan, using the LOIC (Low Orbit Ion Cannon) tool, Jac
Elenna [48]

Answer:

denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack)

Explanation:

Denial-of-service attack -

It is a type of cyber attack , where the hacker can create a machine or any network resource , which is capable to disrupt the server of the host , with the help of the internet , is referred to as the denial of service attack .

The task is accomplished with by flooding the host with many superfluous requests , which can overload the system .

In case of the distributed denial-of-service attack , the flooding is done by many different sources .

Hence , from the given scenario of the question ,

The correct answer is  denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack) .

4 0
4 years ago
A user logs in to a virtual world and creates an animated character representing themselves, which they then use to move through
Romashka [77]

A type of animated character that represents a user in the virtual world, which is used to move throughout the world and interact with other characters and objects is called an <u>avatar</u>.

<h3>What is an avatar?</h3>

An avatar can be defined as a type of animated character that is designed and developed by a software developer to represent a user or player in the virtual world, which is used to move throughout the world and interact with other characters and objects.

In gaming technology and software development, an avatar is typically used to denote a user's (player's) character in the gaming world, virtual world or computer-simulated environment, either in two-dimensional (2D) or three-dimensional (3D).

Read more on avatar here: brainly.com/question/26479902

4 0
3 years ago
Read 2 more answers
Other questions:
  • Create a stored procedure named prc_inv_amounts to update the INV_SUBTOTAL, INV_TAX, and INV_TOTAL. The procedure takes the invo
    8·1 answer
  • What type of file can most software applications read?
    5·2 answers
  • Word's Help feature is useful if you need to quickly learn how to print a document
    14·1 answer
  • Which statement is false? Classes are reusable software components. A class is to an object as a blueprint is to a house. Perfor
    6·1 answer
  • How do you change the text style on brainly mobile ?
    12·1 answer
  • What includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology
    7·1 answer
  • Charts are more effective in attaining attentionthen others methods of presenting data. Do you agree?
    10·1 answer
  • What is a function of Agile software development?<br>​
    7·1 answer
  • Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to
    6·1 answer
  • Does anyone have any tips on how to begin a 10 page Capstone project paper? I've got to write a write a research paper on the ty
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!