1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GalinKa [24]
3 years ago
10

Resumen sobre Tailandia​

Computers and Technology
1 answer:
hoa [83]3 years ago
7 0

Answer:

Thailand is the only country in south-east Asia to have escaped colonial rule. Buddhist religion, the monarchy and the military have helped to shape its society and politics. The military has ruled for most of the period since 1947, with a few interludes in which the country had a democratically elected government.

Explanation:

You might be interested in
What is typically unique in each database table?
andriy [413]

ID number APEX  answer

4 0
3 years ago
Read 2 more answers
Who can help me please? ​
malfutka [58]

Answer:

what do you need help with

4 0
3 years ago
Which one should i get?
Stella [2.4K]

Answer:

Explanation:

third

5 0
3 years ago
Read 2 more answers
Does any of yall know how to delete your account?
il63 [147K]

Answer:

No i really don't but why would you want to delete your account

8 0
3 years ago
TRUE/FALSE QUESTIONS: T F 1. An intruder can also be referred to as a hacker or cracker. T F 2. Activists are either individuals
Law Incorporation [45]

Answer:

1. True 2. False 3. True 4. True 5. True 6. False 7. True

Explanation:

1.  A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.

2. Activists are people who campaign to bring about a positive political or social change.

3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.

4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.

5. Yes, intruders have a common attack methodology.

6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.

7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.

5 0
3 years ago
Other questions:
  • Sam wanted to open a file that he saved yesterday. Which component inside the computer stores this file? the hard drive the fax
    13·2 answers
  • . _______ are the components that allow a posi-traction differential to transfer power from one drive wheel to another.
    10·1 answer
  • There is an enormous amount of information on the Internet that is automatically separated into good content and not-so-good con
    15·1 answer
  • Careers on the largest declining industries list will see an increase in the number of employees in their workforce.
    15·1 answer
  • What is an example of a hard skill?
    12·2 answers
  • An administrator has created a new custom object in a sandbox environment and now is ready to deploy in production. How can the
    11·1 answer
  • If you play gta and don't know the song ''Glamorous'' Then what do you even do when you play?
    6·2 answers
  • Guess The Song:
    9·1 answer
  • Carlie was asked to review a software project for her company to determine specific deadlines. Which part of project management
    9·2 answers
  • 3.5 Lesson practice quiz: Edhesive Question 5
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!