1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fittoniya [83]
3 years ago
9

Giving 5 stars, a Thanks, 80 points, and Branliest to whoever answers them correctly.

Computers and Technology
1 answer:
Mrac [35]3 years ago
4 0

Answer:

Explanation:

The answer is ludonarrative.

Please mark me brainliest.

You might be interested in
What is the best application to keep track of inventory for a store?
exis [7]

"The site iGeeks Blog recommends Inventory Tracker, which functions as a comprehensive inventory tracking system for iPad.

"It works excellently in synchronizing your inventory and comes with some really amazing features that you’d only expect from a desktop app," said the blog.

A free version of the app is available, and the pro version is just $3.99."

3 0
4 years ago
Which type of evidence should victims collect to help officials catch cyber bullies
iren [92.7K]

Answer:

How you get cyberbullied just look away from the screen -Tyler The Creator

Explanation:

3 0
4 years ago
Read 2 more answers
What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity?
Artist 52 [7]

Answer:

message confidentiality

Two or more hosts communicate securely, typically using encryption. The communication cannot be monitored (sniffed) by non trusted hosts. The communication between trusted parties is confidential.

message integrity

The message transported has not been tampered with or altered. A message has integrity when the payload sent is the same as the payload received.

Sending a message confidentially does not guarantee data integrity. Even when two nodes have authenticated each other, the integrity of a message could be compromised during the transmission of a message.

Yes, you can have integrity of a message without confidentiality. One can take a hash or sum of the message on both sides to compare. Often we share downloadable files and provide data integrity using md5 hash sums.

Explanation:

3 0
3 years ago
Hey guys can u tell me <br><br>5 advantages of spread sheet<br>kinda urngent ?​
olya-2409 [2.1K]

1. Spreadsheets Improve Data Organization

2. Easing Collaborative Data Collection

3. Spreadsheets Enable Dynamic Calculations With Built-In Formulas

4. Spreadsheets Are Equipped With Preset Functions

5. Spreadsheets Provide Functionality For Graphing And Visual Aids

hope it helps

5 0
3 years ago
Read 2 more answers
Select all that apply
My name is Ann [436]

Answer:

social change and cultural change i hope this help you

8 0
3 years ago
Other questions:
  • Very often in data science, we are interested in understanding how values change with time. Use np.diff and np.max (or just max)
    13·1 answer
  • What is the most efficient way to include a space after each paragraph?
    13·2 answers
  • To add text into a SmartArt graphic, a user will need to _____.
    14·1 answer
  • How many possible mac addresses are there?
    5·1 answer
  • What is used in computers to communicate with wireless keyboards, mice, and printers?
    8·1 answer
  • Select the correct answer. Tom recently visited a science exhibition where he learned that computer experts programmed robots to
    6·2 answers
  • Use rounding to decide if the answer is reasonable. Write
    15·1 answer
  • Assignment 1 is to write a program that will write the lyrics to "X number of beers on the wall". Use only the main method. Prom
    11·1 answer
  • 1. Explain the difference between a web browser and a search engine. (2 points)
    8·1 answer
  • For which tasks would Excel be useful? Check all that apply.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!