1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
STatiana [176]
3 years ago
9

Help me ASAP! Please and thank you :)

Computers and Technology
1 answer:
KengaRu [80]3 years ago
6 0

step 1: b

step 2: c

step 3: a

step 4: d

You might be interested in
_____ can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard
Monica [59]
<span>Keyloggers can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard and a PC.
</span><span>The keylogger is also called keystroke logger or system monitor. This technology used to monitor and record each keystroke typed on a specific computer's keyboard. </span>
6 0
3 years ago
there are 3 numbers X,Y,Z such that twice X is equal to therice Y and four times Y is equal to five times Z. the ratio between X
777dan777 [17]

Step-by-step explanation:

2x = 3y

4y = 5z

x = 3y/2

z = 4y/5

ratio between x and z is 15 : 8

3 0
3 years ago
Change 'What do they do' into passive voice​
Ivan
What they do is the answer
7 0
3 years ago
Read 2 more answers
1:realizar el algoritmo y el diagrama de flujo del diseño de una pág web del tema de su elección​
dedylja [7]

Answer:

(:

Explanation:

5 0
3 years ago
Design an algorithm that will prompt for and receive pairs of numbers from an operator at a terminal and display their sum, prod
Andrews [41]

Explanation:

The Program is written in Python

7 0
2 years ago
Other questions:
  • Dinah is using an IDE to write, modify, and save code. Which tool should she use?
    11·2 answers
  • . Hackers generally disguise their IP address. True False
    9·1 answer
  • 1. Bluetooth
    5·1 answer
  • ***Help ***Which Paste Command is used to insert a new linked Excel worksheet into a PowerPoint presentation? A. Embed B. Use De
    7·1 answer
  • Modify the code below to do the following:
    12·1 answer
  • Write a short program using Python that will:
    10·1 answer
  • 7. A patent is an example of a rare and valuable resource. Indicate whether the statement is true or false and also justify it.
    14·1 answer
  • 6
    7·2 answers
  • You’re investigating an internal policy violation when you find an e-mail about a serious assault for which a police report need
    7·1 answer
  • owever, sitting in a corner of the store, a hacker had just set up an open "rogue" wireless hotspot posing as the coffee shop’s
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!