1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
levacccp [35]
3 years ago
8

Kos-huar-utb garls jonly​

Computers and Technology
2 answers:
Vlad1618 [11]3 years ago
7 0

Answer:

yeah i have no idea what that says

Explanation:

denis-greek [22]3 years ago
7 0

Are you okay? do you need some help?

You might be interested in
The default _____ color is set when you type text.
Elenna [48]
The default hyperlink color is automatically set when you type
5 0
3 years ago
Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that
kakasveta [241]

Answer:

The answer of the following question is Brute force attack .

Explanation:

A brute force attack is the error and trial method that is used by an application program to decode the encrypted data like passwords or the Data Encryption Standard (DES) keys, which through an exhaustive effort (by using brute force) rather than the employing an intellectual strategies.

7 0
3 years ago
What is HTML ? <br>Give a small description about html
Genrish500 [490]
Hypertext Markup Language, a standardized system for tagging text files to achieve font, colour, graphic, and hyperlink effects on World Wide Web pages.
this information was taken from google
7 0
3 years ago
Read 2 more answers
Which app is used to synchronize data among iOS devices and Windows desktops?
docker41 [41]
ICloud because it links your old device to the new one
4 0
3 years ago
Read 2 more answers
When would you include an executive summary in a report
Hoochie [10]

Answer:

When the report is too long and complex. The executive summary provides a snapshot of what the report talks about at a high level. When the reader needs more details, they can go through the detailed report.

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Vpns create a _____________ to transport information through public communications media.
    8·1 answer
  • Why is it important to use proper line types
    13·1 answer
  • Using the Invert Selection tool while something is selected in Paint will __________.
    14·1 answer
  • Computer design replaced ______________
    14·1 answer
  • Is it possible to make teleportation with a fusion device
    15·1 answer
  • What are invoices? A. Documents that convey a company's liabilities B. Documents that convey how much a company was earning and
    5·2 answers
  • Identify the correct sequence of steps to change the font from Verdana to Arial.
    10·1 answer
  • Write a procedure named Read10 that reads exactly ten characters from standard input into an array of BYTE named myString. Use t
    15·1 answer
  • You are working on a ticketing system. A ticket costs $10. The office is running a discount campaign: each group of 5 people is
    5·1 answer
  • Elan inserted shapes into a slide in his presentation. What is the quickest way to format those shapes?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!