1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
3 years ago
9

NEED HELP

Computers and Technology
1 answer:
amid [387]3 years ago
3 0

Answer:

i would do B

Explanation:

I YOUNGI

I MIDDLE I

I   AGED  I

I     MEH   I

I_______ I

\ kinda old/

  \ ____ /

   I OLD I

You might be interested in
A college student needs a laptop that can be used while committing on the train and sitting in a lecture
Westkost [7]
You could get a laptop for like 200 that could run well and enough space for stuff.
4 0
3 years ago
What is the main advantage that a website builder offers for web development?
Trava [24]
The correct answer is: OA. It enables people with no coding skills to create websites.
4 0
3 years ago
Read 2 more answers
What is the difference between a method and a function? In what ways are they similar? Why do you think Python makes a distincti
makvit [3.9K]

Answer:

A method in python is somewhat similarto a function, except it is associated with object/classes. Methods in python are very similar to functions except for two major differences. The method is implicitly used for an object for which it is called. The method is accessible to data that is contained within the class.

5 0
3 years ago
You are a networking consultant who has been asked to penetration test the network of a small business. you located a target wir
cluponka [151]
<span> In a network that uses WPA2-PSK encryption you can bypass the encryption by using the weakness in the WPA2-PSK system and that is the following:the encrypted password is shared in what is known as the 4-way handshake. </span> When a client authenticates to the access point, the client and the AP go through a 4-step process of authentication.
8 0
4 years ago
The possible states of a process are:
Oliga [24]

Answer:

a. new, running, waiting, ready, and terminated.

Explanation:

The process in a computer system can have different states and these are:

-New: When the process is created.

-Ready: When the process is waiting to be executed.

-Running: When the process is chosen to be executed.

-Waiting: When the process is expecting for something to happen.

-Terminated: When the process is not running anymore.

According to this, the answer is that the possible states of a process are: new, running, waiting, ready, and terminated.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Exit network systems, information support, and software development are all careers in which career cluster?
    10·1 answer
  • 5 What is the effect of the author proposing athought experiment at the beginning of the text? ​
    5·2 answers
  • What are the functions of online gaming communities?
    12·1 answer
  • J. A computer on a network that acts as the central storage location for
    5·1 answer
  • Which of the following describes ETL? a) A process that transforms information using a common set of enterprise definitions b) A
    14·1 answer
  • In no less than two paragraphs, explain the risks and compliance requirements of moving data and services into the cloud.
    11·1 answer
  • 1
    13·1 answer
  • I connected to an external hard drive to transfer some photos from my vacation. When I try to drag the photo, it bounces right b
    14·1 answer
  • Write a program to prompt the user for hours worked to compute a gross pay for an employee, and he is paid 100/hour. If he worke
    7·1 answer
  • Question 1 (1 point)
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!