1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vovikov84 [41]
2 years ago
14

What are movies filmed before 1990's?

Computers and Technology
1 answer:
natita [175]2 years ago
8 0

Answer: Once Upon a Time in the West (1968) PG-13 | 165 min | Western. ...

Cinema Paradiso (1988) R | 155 min | Drama. ...

Blade Runner (1982) R | 117 min | Action, Sci-Fi, Thriller. ...

2001: A Space Odyssey (1968) G | 149 min | Adventure, Sci-Fi. ...

Apocalypse Now (1979) ...

Chinatown (1974) ...

Stardust Memories (1980) ...

Le Notti Bianche (1957)

Explanation:

You might be interested in
Your website is currently at position 5 in organic search. On a monthly basis you currently get on average 5,432 clicks and 32 c
Natalka [10]

Answer:

Answered

Explanation:

This one is worth if I can get more number of clicks and the conversions.

SEO plays a vital role in bringing the website ahead of the competition. In the long run, if a website can reach their target audience with the organic search, then it saves a lot spending over the paid campaigns to bring business. Bringing the website to first position will automatically increase the impression which in turn will result in the more clicks and conversions.

7 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
There are four types of characteristics attributed to a flow: reliability, delay, jitter, and bandwidth. Explain how each of the
sergeinik [125]

Answer and Explanation:

Reliability is important because if the service lacks  lacks reliability this could mean losing a packet or acknowledgement which then requires retransmission.

Delay can be tolerable in different degrees by applications, for example online chatting or conferences need to have the minimum delay possible.

Jitter is the variation in delay for packets belonging to the same flow.

High Jitter: difference between delays is large

Low jitter: difference between delays is small.

Bandwidth depends on the application. In video conferences, for example, there is a need to send million of bits per second to refresh a colour screen while sending a email may not reach even a million.

4 0
3 years ago
A company needs to store its documents in one place, share news and information with all staff, and allow access for employees w
Alenkasestr [34]
C - An Intranet will give access to all employees within the company, whether they work from home or at the office.
4 0
3 years ago
Read 2 more answers
The source Host A is going to send 5KB (5120byte) of data to the destination Host B over an established TCP connection, which ha
NISA [10]

Answer:

the answer is d have a nice day

Explanation: i got a 100

3 0
2 years ago
Other questions:
  • Questions 6 - 9 Refer to the following code: public class WhatsIt { private int[] values; private double average; public WhatsIt
    7·1 answer
  • Having reviewed dod wireless stig (ver6, release 1), sarah learns she may only utilize secnet 54 and ______________ for transmit
    13·1 answer
  • How would you display all your photographic work in your résumé, if you have a large volume of work?
    10·1 answer
  • 12. When trying to identify the sorted column in a table, you would look for the column where A. an arrow is displayed in the fi
    10·2 answers
  • Write the definition of a method min that has two int parameters and returns the smaller.
    9·1 answer
  • The Coins class was created to hold all your loose change, kind of like a piggy bank! For this exercise, you are going to simula
    15·1 answer
  • Exercise#3: Write a ch program that performs the following: Declare a two arrays called arrayA and arrayB that holds integer and
    6·1 answer
  • Help it don’t let me click what do I do
    13·1 answer
  • If you can name this you get 15 points: ↑↑↓↓←→←→βα
    10·1 answer
  • Hey should I get a r()blox gift card if so what amount 5 dollars 10 or 100
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!