1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
netineya [11]
2 years ago
6

I have no idea, this has two parts. Any help I would love.

Computers and Technology
1 answer:
lana [24]2 years ago
7 0

Answer:

2that is the question??? then many I could help

You might be interested in
HELP ASAP!!!
stiks02 [169]
Comparison would be most suitable. I hope I could be a help


7 0
3 years ago
Read 2 more answers
Please answer my question y'all!
katrin [286]

Answer:

Explanation:1000 mp3s

6 0
2 years ago
Read 2 more answers
One of the first and main steps in protecting your email is to have a __________ filtering system.
Alexxx [7]

<em>Answer:</em>

<em>One of the first and main steps in protecting your email is to have a </em><em><u>URL</u></em><em> filtering system.</em>

3 0
2 years ago
What best determines whether a borrower's interest rate on an adjustable rato loan goes up or down?
Lelu [443]

Answer:

a bank finances

Explanation:

the best determines whether a borrower's investment on an adjustable-rate loan goes up or down is the current market. The market's condition drastically impacts the rate of investment.

8 0
3 years ago
Read 2 more answers
When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack"
kumpel [21]

<em>The answer is : He must consult with a lawyer. </em>

<em>Hacking is considered illegal and in other countries, it is punishable by law. Hacking is gaining unauthorized access to a network. Even when someone is giving you permission to do it, it is still wrong and illegal. Therefore, you must know of your rights and make all the party involved to signed an agreement to save yourself.</em>

8 0
3 years ago
Other questions:
  • A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is a
    14·1 answer
  • Why is exception handling an issue for testers in object-oriented developments?
    15·1 answer
  • “Green Technology” is also known as what?
    11·1 answer
  • Missy creates a personal budget. She enters her current savings account balance in cell D3. In cell A3, she calculates her incom
    13·2 answers
  • Which scenario depicts an ethical workplace practice by a business owner? A. sharing personal information of its employees with
    8·2 answers
  • Janet received an email from a bank asking for the password for her Internet banking account. She emailed back her password. A f
    12·2 answers
  • The base 10 number 18 is equal to which base 16 number?<br><br> 10<br><br> 12<br><br> 14<br><br> 16
    11·1 answer
  • It connects computers in different cities and different countries
    9·2 answers
  • 4.11 lesson practice quizz need help on 2 and 3
    5·1 answer
  • Do you have any sprites for Friday Night Funkin?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!